000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x900000000000000, 0x0) [ 2245.802324] loop5: detected capacity change from 0 to 264192 [ 2245.803436] loop7: detected capacity change from 0 to 215922 [ 2245.809785] loop6: detected capacity change from 0 to 215922 [ 2245.810437] loop4: detected capacity change from 0 to 215922 [ 2245.843276] FAULT_INJECTION: forcing a failure. [ 2245.843276] name failslab, interval 1, probability 0, space 0, times 0 [ 2245.843313] CPU: 1 PID: 9658 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2245.843342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2245.843360] Call Trace: [ 2245.843368] [ 2245.843383] dump_stack_lvl+0x8b/0xb3 [ 2245.843421] should_fail.cold+0x5/0xa [ 2245.843448] ? create_object.isra.0+0x3a/0xa20 [ 2245.843488] should_failslab+0x5/0x10 [ 2245.843522] kmem_cache_alloc+0x5b/0x480 [ 2245.843572] create_object.isra.0+0x3a/0xa20 [ 2245.843605] ? kasan_unpoison+0x23/0x50 [ 2245.843644] kmem_cache_alloc+0x239/0x480 [ 2245.843693] getname_flags.part.0+0x50/0x4f0 [ 2245.843727] ? kmem_cache_free+0xe0/0x420 [ 2245.843774] getname_flags+0x9a/0xe0 [ 2245.843811] vfs_fstatat+0x73/0xb0 [ 2245.843856] __do_sys_newstat+0x88/0x110 [ 2245.843896] ? __ia32_sys_stat+0x70/0x70 [ 2245.843934] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2245.843974] ? xfd_validate_state+0x59/0x180 [ 2245.844016] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2245.844070] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2245.844112] ? lockdep_hardirqs_on+0x79/0x100 [ 2245.844153] do_syscall_64+0x3b/0x90 [ 2245.844183] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2245.844220] RIP: 0033:0x7f1d2141db16 [ 2245.844239] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2245.844265] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2245.844290] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16 [ 2245.844308] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40 [ 2245.844325] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2245.844341] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000007 [ 2245.844357] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2245.844402] [ 2245.848015] loop2: detected capacity change from 0 to 215922 [ 2245.864296] FAULT_INJECTION: forcing a failure. [ 2245.864296] name failslab, interval 1, probability 0, space 0, times 0 21:23:49 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x800000000000000, 0x0) 21:23:49 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 87) 21:23:49 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x1800000000000000, 0x0) 21:23:49 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 81) [ 2245.864325] CPU: 1 PID: 9654 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2245.864349] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2245.864363] Call Trace: 21:23:49 executing program 5: syz_read_part_table(0xf6ffffff, 0x0, 0x0) 21:23:49 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2284, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:23:49 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2282, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2245.864369] [ 2245.864376] dump_stack_lvl+0x8b/0xb3 [ 2245.864404] should_fail.cold+0x5/0xa [ 2245.864426] ? getname_flags.part.0+0x50/0x4f0 [ 2245.864458] should_failslab+0x5/0x10 [ 2245.864501] kmem_cache_alloc+0x5b/0x480 [ 2245.864532] ? putname+0xfe/0x140 [ 2245.864565] getname_flags.part.0+0x50/0x4f0 [ 2245.864594] ? kmem_cache_free+0xe0/0x420 [ 2245.864633] getname_flags+0x9a/0xe0 [ 2245.864664] vfs_fstatat+0x73/0xb0 [ 2245.864701] __do_sys_newstat+0x88/0x110 [ 2245.864734] ? __ia32_sys_stat+0x70/0x70 [ 2245.864766] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2245.864799] ? xfd_validate_state+0x59/0x180 [ 2245.864832] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2245.864877] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2245.864911] ? lockdep_hardirqs_on+0x79/0x100 [ 2245.864945] do_syscall_64+0x3b/0x90 [ 2245.864970] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2245.864999] RIP: 0033:0x7f5b6be25b16 [ 2245.865015] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 21:23:49 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6400000000000000, 0x0) [ 2245.865035] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2245.865056] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2245.865071] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2245.865084] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2245.865097] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006 [ 2245.865110] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2245.865147] [ 2245.866983] loop5: detected capacity change from 0 to 264192 [ 2245.875228] 9pnet_fd: p9_fd_create_tcp (9657): problem connecting socket to 127.0.0.1 [ 2245.908858] loop2: detected capacity change from 0 to 215922 [ 2246.119019] loop4: detected capacity change from 0 to 215922 [ 2246.127922] loop7: detected capacity change from 0 to 215922 [ 2246.134641] FAULT_INJECTION: forcing a failure. [ 2246.134641] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.134673] CPU: 1 PID: 9673 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2246.134697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2246.134717] Call Trace: [ 2246.134724] [ 2246.134732] dump_stack_lvl+0x8b/0xb3 [ 2246.134764] should_fail.cold+0x5/0xa [ 2246.134792] should_failslab+0x5/0x10 [ 2246.134822] kmem_cache_alloc_lru+0x60/0x7c0 [ 2246.134856] ? __d_alloc+0x31/0x990 [ 2246.134888] __d_alloc+0x31/0x990 [ 2246.134918] d_alloc_parallel+0x10a/0x1c00 [ 2246.134942] ? __lock_acquire+0x164e/0x6120 [ 2246.134992] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2246.135024] ? find_held_lock+0x2c/0x110 [ 2246.135050] ? __d_lookup_rcu+0x730/0x730 [ 2246.135079] ? lockdep_init_map_type+0x21a/0x7e0 [ 2246.135111] ? lockdep_init_map_type+0x21a/0x7e0 [ 2246.135153] __lookup_slow+0x193/0x490 [ 2246.135181] ? page_put_link+0x1f0/0x1f0 [ 2246.135214] ? p9_pollwake+0x100/0x170 [ 2246.135253] ? p9_pollwake+0x100/0x170 [ 2246.135283] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2246.135318] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2246.135351] ? link_path_walk.part.0+0x154/0xf80 [ 2246.135386] walk_component+0x411/0x6a0 [ 2246.135415] ? handle_dots.part.0+0x1500/0x1500 [ 2246.135445] ? path_init+0x17b0/0x17b0 [ 2246.135488] path_lookupat+0x1ba/0x850 [ 2246.135527] filename_lookup+0x1c6/0x590 [ 2246.135560] ? may_linkat+0x500/0x500 [ 2246.135602] ? find_held_lock+0x2c/0x110 [ 2246.135632] ? lock_release+0x3b2/0x750 [ 2246.135658] ? __might_fault+0xd1/0x170 [ 2246.135691] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2246.135725] ? __virt_addr_valid+0xe9/0x350 [ 2246.135756] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2246.135789] ? is_vmalloc_addr+0x7b/0xb0 [ 2246.135816] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2246.135849] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2246.135881] ? __check_object_size+0x1b5/0x890 [ 2246.135921] vfs_statx+0x148/0x390 [ 2246.135961] ? inode_sub_bytes+0x100/0x100 [ 2246.135992] ? getname_flags.part.0+0x1dd/0x4f0 [ 2246.136021] ? kmem_cache_free+0xe0/0x420 [ 2246.136067] vfs_fstatat+0x8c/0xb0 [ 2246.136105] __do_sys_newstat+0x88/0x110 [ 2246.136139] ? __ia32_sys_stat+0x70/0x70 [ 2246.136171] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2246.136203] ? xfd_validate_state+0x59/0x180 [ 2246.136239] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2246.136286] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2246.136321] ? lockdep_hardirqs_on+0x79/0x100 [ 2246.136356] do_syscall_64+0x3b/0x90 [ 2246.136382] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2246.136411] RIP: 0033:0x7f1d2141db16 [ 2246.136429] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2246.136450] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2246.136471] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16 [ 2246.136498] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40 [ 2246.136513] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2246.136526] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000006 [ 2246.136539] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2246.136578] [ 2246.163798] loop5: detected capacity change from 0 to 264192 [ 2246.205344] loop5: detected capacity change from 0 to 264192 [ 2246.207901] loop6: detected capacity change from 0 to 215922 [ 2246.222373] FAULT_INJECTION: forcing a failure. [ 2246.222373] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.222405] CPU: 1 PID: 9681 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2246.222429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2246.222445] Call Trace: [ 2246.222450] [ 2246.222458] dump_stack_lvl+0x8b/0xb3 [ 2246.222490] should_fail.cold+0x5/0xa [ 2246.222513] ? getname_flags.part.0+0x50/0x4f0 [ 2246.222546] should_failslab+0x5/0x10 [ 2246.222574] kmem_cache_alloc+0x5b/0x480 [ 2246.222613] ? putname+0xfe/0x140 [ 2246.222650] getname_flags.part.0+0x50/0x4f0 [ 2246.222678] ? kmem_cache_free+0xe0/0x420 [ 2246.222717] getname_flags+0x9a/0xe0 [ 2246.222748] vfs_fstatat+0x73/0xb0 [ 2246.222785] __do_sys_newstat+0x88/0x110 [ 2246.222819] ? __ia32_sys_stat+0x70/0x70 [ 2246.222851] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2246.222884] ? xfd_validate_state+0x59/0x180 [ 2246.222920] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2246.222965] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2246.223001] ? lockdep_hardirqs_on+0x79/0x100 [ 2246.223035] do_syscall_64+0x3b/0x90 [ 2246.223060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2246.223090] RIP: 0033:0x7f5b6be25b16 [ 2246.223107] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2246.223129] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2246.223150] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2246.223165] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2246.223179] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2246.223193] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006 [ 2246.223207] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2246.223244] [ 2246.255192] loop2: detected capacity change from 0 to 215922 [ 2246.323930] loop2: detected capacity change from 0 to 215922 21:24:05 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 88) 21:24:05 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x900000000000000, 0x0) 21:24:05 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2285, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:24:05 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:24:05 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2283, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:24:05 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x8004000000000000, 0x0) 21:24:05 executing program 5: syz_read_part_table(0xfcfdffff, 0x0, 0x0) 21:24:05 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 82) [ 2262.309330] loop7: detected capacity change from 0 to 215922 [ 2262.325381] loop2: detected capacity change from 0 to 215922 21:24:06 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x8cffffff00000000, 0x0) 21:24:06 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x1800000000000000, 0x0) [ 2262.380318] loop5: detected capacity change from 0 to 264192 [ 2262.383892] 9pnet_fd: p9_fd_create_tcp (9703): problem connecting socket to 127.0.0.1 [ 2262.389768] FAULT_INJECTION: forcing a failure. [ 2262.389768] name failslab, interval 1, probability 0, space 0, times 0 [ 2262.389803] CPU: 1 PID: 9705 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2262.389824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2262.389837] Call Trace: [ 2262.389843] [ 2262.389851] dump_stack_lvl+0x8b/0xb3 [ 2262.389884] should_fail.cold+0x5/0xa [ 2262.389901] ? create_object.isra.0+0x3a/0xa20 [ 2262.389926] should_failslab+0x5/0x10 [ 2262.389948] kmem_cache_alloc+0x5b/0x480 [ 2262.389990] create_object.isra.0+0x3a/0xa20 [ 2262.390017] ? kasan_unpoison+0x23/0x50 [ 2262.390046] kmem_cache_alloc_lru+0x2d3/0x7c0 [ 2262.390075] ? __d_alloc+0x31/0x990 [ 2262.390103] __d_alloc+0x31/0x990 [ 2262.390130] d_alloc_parallel+0x10a/0x1c00 [ 2262.390151] ? __lock_acquire+0x164e/0x6120 [ 2262.390197] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2262.390222] ? find_held_lock+0x2c/0x110 [ 2262.390244] ? __d_lookup_rcu+0x730/0x730 [ 2262.390270] ? lockdep_init_map_type+0x21a/0x7e0 [ 2262.390297] ? lockdep_init_map_type+0x21a/0x7e0 [ 2262.390335] __lookup_slow+0x193/0x490 [ 2262.390360] ? page_put_link+0x1f0/0x1f0 [ 2262.390395] ? p9_pollwake+0x100/0x170 [ 2262.390431] ? p9_pollwake+0x100/0x170 [ 2262.390456] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2262.390487] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2262.390517] ? link_path_walk.part.0+0x154/0xf80 [ 2262.390549] walk_component+0x411/0x6a0 [ 2262.390574] ? handle_dots.part.0+0x1500/0x1500 [ 2262.390600] ? path_init+0x17b0/0x17b0 [ 2262.390636] path_lookupat+0x1ba/0x850 [ 2262.390671] filename_lookup+0x1c6/0x590 [ 2262.390699] ? may_linkat+0x500/0x500 [ 2262.390735] ? find_held_lock+0x2c/0x110 [ 2262.390761] ? lock_release+0x3b2/0x750 [ 2262.390784] ? __might_fault+0xd1/0x170 [ 2262.390814] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2262.390842] ? __virt_addr_valid+0xe9/0x350 [ 2262.390871] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2262.390902] ? is_vmalloc_addr+0x7b/0xb0 [ 2262.390929] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2262.390957] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2262.390985] ? __check_object_size+0x1b5/0x890 [ 2262.391018] vfs_statx+0x148/0x390 [ 2262.391054] ? inode_sub_bytes+0x100/0x100 21:24:06 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 89) [ 2262.391080] ? getname_flags.part.0+0x1dd/0x4f0 [ 2262.391104] ? kmem_cache_free+0xe0/0x420 [ 2262.391144] vfs_fstatat+0x8c/0xb0 [ 2262.391176] __do_sys_newstat+0x88/0x110 [ 2262.391205] ? __ia32_sys_stat+0x70/0x70 [ 2262.391233] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2262.391261] ? xfd_validate_state+0x59/0x180 [ 2262.391294] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2262.391336] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2262.391374] ? lockdep_hardirqs_on+0x79/0x100 [ 2262.391404] do_syscall_64+0x3b/0x90 [ 2262.391427] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2262.391453] RIP: 0033:0x7f1d2141db16 [ 2262.391467] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2262.391486] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2262.391506] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16 [ 2262.391519] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40 [ 2262.391523] loop6: detected capacity change from 0 to 215922 [ 2262.391532] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2262.391545] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000006 [ 2262.391558] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2262.391593] [ 2262.407557] FAULT_INJECTION: forcing a failure. [ 2262.407557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2262.407705] CPU: 0 PID: 9702 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2262.407727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2262.407738] Call Trace: [ 2262.407742] [ 2262.407749] dump_stack_lvl+0x8b/0xb3 [ 2262.407773] should_fail.cold+0x5/0xa [ 2262.407795] strncpy_from_user+0x34/0x3d0 [ 2262.407828] getname_flags.part.0+0x95/0x4f0 [ 2262.407855] ? kmem_cache_free+0xe0/0x420 [ 2262.407891] getname_flags+0x9a/0xe0 [ 2262.407919] vfs_fstatat+0x73/0xb0 [ 2262.407950] __do_sys_newstat+0x88/0x110 [ 2262.407977] ? __ia32_sys_stat+0x70/0x70 [ 2262.408002] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2262.408028] ? xfd_validate_state+0x59/0x180 [ 2262.408056] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2262.408091] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2262.408117] ? lockdep_hardirqs_on+0x79/0x100 [ 2262.408144] do_syscall_64+0x3b/0x90 [ 2262.408163] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2262.408186] RIP: 0033:0x7f5b6be25b16 [ 2262.408198] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 21:24:06 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:24:06 executing program 5: syz_read_part_table(0xfdfdffff, 0x0, 0x0) 21:24:06 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2286, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:24:06 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 83) 21:24:06 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2284, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2262.408214] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2262.408229] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2262.408240] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2262.408251] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2262.408261] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006 [ 2262.408273] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2262.408303] [ 2262.412315] loop4: detected capacity change from 0 to 215922 [ 2262.422873] loop5: detected capacity change from 0 to 264192 [ 2262.447218] loop2: detected capacity change from 0 to 215922 21:24:06 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xb3e5960600000000, 0x0) [ 2262.590979] loop7: detected capacity change from 0 to 215922 [ 2262.599371] FAULT_INJECTION: forcing a failure. [ 2262.599371] name failslab, interval 1, probability 0, space 0, times 0 [ 2262.599397] CPU: 0 PID: 9724 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2262.599418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2262.599429] Call Trace: [ 2262.599434] [ 2262.599440] dump_stack_lvl+0x8b/0xb3 [ 2262.599464] should_fail.cold+0x5/0xa [ 2262.599481] ? getname_flags.part.0+0x50/0x4f0 [ 2262.599508] should_failslab+0x5/0x10 [ 2262.599533] kmem_cache_alloc+0x5b/0x480 [ 2262.599561] ? putname+0xfe/0x140 [ 2262.599595] getname_flags.part.0+0x50/0x4f0 [ 2262.599620] ? kmem_cache_free+0xe0/0x420 [ 2262.599654] getname_flags+0x9a/0xe0 [ 2262.599682] vfs_fstatat+0x73/0xb0 [ 2262.599714] __do_sys_newstat+0x88/0x110 [ 2262.599744] ? __ia32_sys_stat+0x70/0x70 [ 2262.599772] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2262.599802] ? xfd_validate_state+0x59/0x180 [ 2262.599833] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2262.599874] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2262.599909] ? lockdep_hardirqs_on+0x79/0x100 [ 2262.599938] do_syscall_64+0x3b/0x90 [ 2262.599961] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2262.599988] RIP: 0033:0x7f1d2141db16 [ 2262.600001] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2262.600019] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2262.600037] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16 [ 2262.600050] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40 [ 2262.600062] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2262.600074] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000007 [ 2262.600085] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2262.600119] [ 2262.631873] loop4: detected capacity change from 0 to 215922 [ 2262.660026] loop6: detected capacity change from 0 to 215922 [ 2262.660857] loop5: detected capacity change from 0 to 264192 [ 2262.667453] FAULT_INJECTION: forcing a failure. [ 2262.667453] name failslab, interval 1, probability 0, space 0, times 0 [ 2262.667887] CPU: 0 PID: 9729 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2262.667911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2262.667923] Call Trace: [ 2262.667928] [ 2262.667935] dump_stack_lvl+0x8b/0xb3 [ 2262.667964] should_fail.cold+0x5/0xa [ 2262.667988] ? getname_flags.part.0+0x50/0x4f0 [ 2262.668022] should_failslab+0x5/0x10 [ 2262.668051] kmem_cache_alloc+0x5b/0x480 [ 2262.668086] ? putname+0xfe/0x140 [ 2262.668122] getname_flags.part.0+0x50/0x4f0 [ 2262.668153] ? kmem_cache_free+0xe0/0x420 [ 2262.668189] getname_flags+0x9a/0xe0 [ 2262.668216] vfs_fstatat+0x73/0xb0 [ 2262.668249] __do_sys_newstat+0x88/0x110 [ 2262.668278] ? __ia32_sys_stat+0x70/0x70 [ 2262.668306] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2262.668335] ? xfd_validate_state+0x59/0x180 [ 2262.668366] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2262.668406] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2262.668435] ? lockdep_hardirqs_on+0x79/0x100 [ 2262.668464] do_syscall_64+0x3b/0x90 [ 2262.668544] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2262.668572] RIP: 0033:0x7f5b6be25b16 [ 2262.668590] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2262.668611] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2262.668629] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2262.668641] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2262.668653] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2262.668665] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006 [ 2262.668677] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2262.668711] [ 2262.674380] loop5: detected capacity change from 0 to 264192 [ 2262.675456] loop2: detected capacity change from 0 to 215922 [ 2262.693152] 9pnet_fd: p9_fd_create_tcp (9736): problem connecting socket to 127.0.0.1 [ 2262.704985] loop2: detected capacity change from 0 to 215922 21:24:23 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6400000000000000, 0x0) 21:24:23 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2287, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:24:23 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:24:23 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xf6ffffff00000000, 0x0) 21:24:23 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 84) 21:24:23 executing program 5: syz_read_part_table(0xfdffffff, 0x0, 0x0) 21:24:23 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2285, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:24:23 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 90) 21:24:23 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfcfdffff00000000, 0x0) [ 2280.253357] loop6: detected capacity change from 0 to 215922 [ 2280.272090] loop5: detected capacity change from 0 to 264192 [ 2280.273889] 9pnet_fd: p9_fd_create_tcp (9756): problem connecting socket to 127.0.0.1 [ 2280.302348] loop4: detected capacity change from 0 to 215922 [ 2280.324478] loop7: detected capacity change from 0 to 215922 [ 2280.330489] loop5: detected capacity change from 0 to 264192 [ 2280.343359] FAULT_INJECTION: forcing a failure. [ 2280.343359] name failslab, interval 1, probability 0, space 0, times 0 [ 2280.343388] CPU: 0 PID: 9750 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2280.343413] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2280.343425] Call Trace: [ 2280.343431] [ 2280.343437] dump_stack_lvl+0x8b/0xb3 [ 2280.343462] should_fail.cold+0x5/0xa [ 2280.343481] ? getname_flags.part.0+0x50/0x4f0 [ 2280.343509] should_failslab+0x5/0x10 [ 2280.343532] kmem_cache_alloc+0x5b/0x480 [ 2280.343557] ? putname+0xfe/0x140 [ 2280.343584] getname_flags.part.0+0x50/0x4f0 [ 2280.343608] ? kmem_cache_free+0xe0/0x420 21:24:24 executing program 5: syz_read_part_table(0xfeffffff, 0x0, 0x0) [ 2280.343640] getname_flags+0x9a/0xe0 [ 2280.343664] vfs_fstatat+0x73/0xb0 [ 2280.343695] __do_sys_newstat+0x88/0x110 [ 2280.343724] ? __ia32_sys_stat+0x70/0x70 [ 2280.343749] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 21:24:24 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 91) 21:24:24 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2288, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2280.343774] ? xfd_validate_state+0x59/0x180 [ 2280.343799] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2280.343833] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2280.343859] ? lockdep_hardirqs_on+0x79/0x100 [ 2280.343885] do_syscall_64+0x3b/0x90 [ 2280.343903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2280.343926] RIP: 0033:0x7f5b6be25b16 [ 2280.343938] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2280.343954] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2280.343969] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2280.343979] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2280.343989] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2280.343999] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006 [ 2280.344009] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2280.344033] [ 2280.355969] FAULT_INJECTION: forcing a failure. [ 2280.355969] name failslab, interval 1, probability 0, space 0, times 0 [ 2280.355996] CPU: 0 PID: 9764 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2280.356015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2280.356027] Call Trace: [ 2280.356033] [ 2280.356040] dump_stack_lvl+0x8b/0xb3 [ 2280.356066] should_fail.cold+0x5/0xa [ 2280.356086] ? kobject_uevent_env+0x236/0xfa0 [ 2280.356111] should_failslab+0x5/0x10 [ 2280.356135] kmem_cache_alloc_trace+0x55/0x3c0 [ 2280.356170] kobject_uevent_env+0x236/0xfa0 [ 2280.356192] ? dev_uevent_filter+0xd0/0xd0 [ 2280.356215] ? kernfs_put+0x42/0x50 [ 2280.356249] __loop_clr_fd+0x2f8/0x8b0 [ 2280.356278] lo_ioctl+0x632/0x1990 [ 2280.356302] ? vfs_fstatat+0x97/0xb0 [ 2280.356335] ? loop_set_status_old+0x1b0/0x1b0 [ 2280.356358] ? avc_ss_reset+0x180/0x180 [ 2280.356404] ? __lock_acquire+0xbac/0x6120 [ 2280.356444] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2280.356473] ? lock_is_held_type+0xd7/0x130 [ 2280.356497] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2280.356528] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2280.356557] ? do_vfs_ioctl+0x132/0x1610 [ 2280.356592] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2280.356622] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2280.356641] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2280.356670] ? blkdev_bszset+0x1f0/0x1f0 [ 2280.356689] ? selinux_inode_getsecctx+0x90/0x90 [ 2280.356720] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2280.356750] ? __ia32_sys_stat+0x70/0x70 [ 2280.356780] ? loop_set_status_old+0x1b0/0x1b0 [ 2280.356808] blkdev_ioctl+0x356/0x7f0 [ 2280.356827] ? blkdev_common_ioctl+0x1990/0x1990 [ 2280.356846] ? selinux_file_ioctl+0xb1/0x260 [ 2280.356875] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2280.356903] ? blkdev_common_ioctl+0x1990/0x1990 [ 2280.356926] __x64_sys_ioctl+0x196/0x210 [ 2280.356956] do_syscall_64+0x3b/0x90 [ 2280.356978] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2280.357022] RIP: 0033:0x7f1d2141e8d7 [ 2280.357036] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2280.357053] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2280.357070] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7 [ 2280.357082] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2280.357093] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2280.357104] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008 [ 2280.357115] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2280.357146] [ 2280.374694] loop2: detected capacity change from 0 to 215922 [ 2280.416350] loop2: detected capacity change from 0 to 215922 [ 2280.479244] loop5: detected capacity change from 0 to 264192 [ 2280.508171] loop5: detected capacity change from 0 to 264192 [ 2280.580845] loop7: detected capacity change from 0 to 215922 [ 2280.583272] loop4: detected capacity change from 0 to 215922 [ 2280.594042] FAULT_INJECTION: forcing a failure. [ 2280.594042] name failslab, interval 1, probability 0, space 0, times 0 [ 2280.594071] CPU: 0 PID: 9778 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2280.594089] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2280.594100] Call Trace: [ 2280.594105] [ 2280.594112] dump_stack_lvl+0x8b/0xb3 [ 2280.594136] should_fail.cold+0x5/0xa [ 2280.594153] ? create_object.isra.0+0x3a/0xa20 [ 2280.594178] should_failslab+0x5/0x10 [ 2280.594199] kmem_cache_alloc+0x5b/0x480 [ 2280.594229] create_object.isra.0+0x3a/0xa20 [ 2280.594249] ? kasan_unpoison+0x23/0x50 [ 2280.594272] kmem_cache_alloc+0x239/0x480 [ 2280.594309] getname_flags.part.0+0x50/0x4f0 [ 2280.594336] ? kmem_cache_free+0xe0/0x420 [ 2280.594365] getname_flags+0x9a/0xe0 [ 2280.594390] vfs_fstatat+0x73/0xb0 [ 2280.594421] __do_sys_newstat+0x88/0x110 [ 2280.594449] ? __ia32_sys_stat+0x70/0x70 [ 2280.594475] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2280.594503] ? xfd_validate_state+0x59/0x180 [ 2280.594531] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2280.594569] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2280.594599] ? lockdep_hardirqs_on+0x79/0x100 [ 2280.594627] do_syscall_64+0x3b/0x90 [ 2280.594648] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2280.594674] RIP: 0033:0x7f1d2141db16 [ 2280.594687] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2280.594704] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2280.594722] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16 [ 2280.594735] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40 [ 2280.594747] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2280.594759] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000007 [ 2280.594771] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2280.594802] [ 2296.782768] loop7: detected capacity change from 0 to 215922 21:24:40 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfeffffff00000000, 0x0) 21:24:40 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:24:40 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 92) 21:24:40 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2286, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:24:40 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 85) 21:24:40 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x8004000000000000, 0x0) 21:24:40 executing program 5: syz_read_part_table(0xfffff000, 0x0, 0x0) 21:24:40 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2289, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2296.802432] loop5: detected capacity change from 0 to 264192 [ 2296.809550] FAULT_INJECTION: forcing a failure. [ 2296.809550] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.809626] CPU: 1 PID: 9786 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2296.809644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2296.809654] Call Trace: [ 2296.809659] [ 2296.809666] dump_stack_lvl+0x8b/0xb3 [ 2296.809691] should_fail.cold+0x5/0xa [ 2296.809710] should_failslab+0x5/0x10 [ 2296.809731] kmem_cache_alloc_lru+0x60/0x7c0 [ 2296.809755] ? __d_alloc+0x31/0x990 [ 2296.809777] __d_alloc+0x31/0x990 [ 2296.809800] d_alloc_parallel+0x10a/0x1c00 [ 2296.809816] ? __lock_acquire+0x164e/0x6120 [ 2296.809851] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2296.809869] ? find_held_lock+0x2c/0x110 [ 2296.809887] ? __d_lookup_rcu+0x730/0x730 [ 2296.809907] ? lockdep_init_map_type+0x21a/0x7e0 [ 2296.809928] ? lockdep_init_map_type+0x21a/0x7e0 [ 2296.809956] __lookup_slow+0x193/0x490 [ 2296.809976] ? page_put_link+0x1f0/0x1f0 [ 2296.809998] ? p9_pollwake+0x100/0x170 [ 2296.810026] ? p9_pollwake+0x100/0x170 [ 2296.810045] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2296.810071] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2296.810093] ? link_path_walk.part.0+0x154/0xf80 [ 2296.810117] walk_component+0x411/0x6a0 [ 2296.810136] ? handle_dots.part.0+0x1500/0x1500 [ 2296.810156] ? path_init+0x17b0/0x17b0 [ 2296.810185] path_lookupat+0x1ba/0x850 [ 2296.810211] filename_lookup+0x1c6/0x590 [ 2296.810233] ? may_linkat+0x500/0x500 [ 2296.810261] ? find_held_lock+0x2c/0x110 [ 2296.810281] ? lock_release+0x3b2/0x750 [ 2296.810298] ? __might_fault+0xd1/0x170 [ 2296.810321] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2296.810344] ? __virt_addr_valid+0xe9/0x350 [ 2296.810369] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2296.810392] ? is_vmalloc_addr+0x7b/0xb0 [ 2296.810412] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2296.810434] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2296.810456] ? __check_object_size+0x1b5/0x890 [ 2296.810484] vfs_statx+0x148/0x390 [ 2296.810511] ? inode_sub_bytes+0x100/0x100 [ 2296.810531] ? getname_flags.part.0+0x1dd/0x4f0 [ 2296.810558] ? kmem_cache_free+0xe0/0x420 [ 2296.810595] vfs_fstatat+0x8c/0xb0 [ 2296.810620] __do_sys_newstat+0x88/0x110 [ 2296.810643] ? __ia32_sys_stat+0x70/0x70 [ 2296.810664] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2296.810686] ? xfd_validate_state+0x59/0x180 [ 2296.810710] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2296.810742] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2296.810767] ? lockdep_hardirqs_on+0x79/0x100 [ 2296.810790] do_syscall_64+0x3b/0x90 [ 2296.810808] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2296.810829] RIP: 0033:0x7f1d2141db16 [ 2296.810841] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2296.810856] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2296.810871] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16 [ 2296.810881] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40 [ 2296.810891] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 21:24:40 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x8cffffff00000000, 0x0) [ 2296.810901] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000007 [ 2296.810910] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2296.810937] [ 2296.847794] loop6: detected capacity change from 0 to 215922 21:24:40 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 86) [ 2296.853261] loop2: detected capacity change from 0 to 215922 [ 2296.853989] loop5: detected capacity change from 0 to 264192 21:24:40 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2287, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2296.854140] 9pnet_fd: p9_fd_create_tcp (9799): problem connecting socket to 127.0.0.1 [ 2296.854564] FAULT_INJECTION: forcing a failure. [ 2296.854564] name failslab, interval 1, probability 0, space 0, times 0 21:24:40 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 93) 21:24:40 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfeffffffffffffff, 0x0) 21:24:40 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 87) [ 2296.854758] CPU: 1 PID: 9798 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2296.854776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2296.854787] Call Trace: [ 2296.854791] [ 2296.854796] dump_stack_lvl+0x8b/0xb3 [ 2296.854825] should_fail.cold+0x5/0xa [ 2296.854841] ? create_object.isra.0+0x3a/0xa20 [ 2296.854865] should_failslab+0x5/0x10 [ 2296.854885] kmem_cache_alloc+0x5b/0x480 [ 2296.854914] create_object.isra.0+0x3a/0xa20 [ 2296.854932] ? kasan_unpoison+0x23/0x50 [ 2296.854955] kmem_cache_alloc_lru+0x2d3/0x7c0 [ 2296.854978] ? __d_alloc+0x31/0x990 [ 2296.855003] __d_alloc+0x31/0x990 [ 2296.855025] d_alloc_parallel+0x10a/0x1c00 21:24:40 executing program 5: syz_read_part_table(0xfffffdfc, 0x0, 0x0) [ 2296.855042] ? __lock_acquire+0x164e/0x6120 [ 2296.855076] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2296.855095] ? find_held_lock+0x2c/0x110 [ 2296.855112] ? __d_lookup_rcu+0x730/0x730 [ 2296.855132] ? lockdep_init_map_type+0x21a/0x7e0 [ 2296.855153] ? lockdep_init_map_type+0x21a/0x7e0 [ 2296.855181] __lookup_slow+0x193/0x490 [ 2296.855201] ? page_put_link+0x1f0/0x1f0 [ 2296.855223] ? p9_pollwake+0x100/0x170 [ 2296.855250] ? p9_pollwake+0x100/0x170 [ 2296.855270] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2296.855294] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2296.855316] ? link_path_walk.part.0+0x154/0xf80 [ 2296.855340] walk_component+0x411/0x6a0 [ 2296.855361] ? handle_dots.part.0+0x1500/0x1500 [ 2296.855381] ? path_init+0x17b0/0x17b0 [ 2296.855413] path_lookupat+0x1ba/0x850 [ 2296.855439] filename_lookup+0x1c6/0x590 [ 2296.855463] ? may_linkat+0x500/0x500 [ 2296.855491] ? find_held_lock+0x2c/0x110 [ 2296.855512] ? lock_release+0x3b2/0x750 [ 2296.855529] ? __might_fault+0xd1/0x170 [ 2296.855561] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2296.855588] ? __virt_addr_valid+0xe9/0x350 [ 2296.855610] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2296.855632] ? is_vmalloc_addr+0x7b/0xb0 [ 2296.855651] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2296.855673] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2296.855695] ? __check_object_size+0x1b5/0x890 [ 2296.855722] vfs_statx+0x148/0x390 [ 2296.855749] ? inode_sub_bytes+0x100/0x100 [ 2296.855770] ? getname_flags.part.0+0x1dd/0x4f0 [ 2296.855789] ? kmem_cache_free+0xe0/0x420 [ 2296.855821] vfs_fstatat+0x8c/0xb0 [ 2296.855847] __do_sys_newstat+0x88/0x110 [ 2296.855870] ? __ia32_sys_stat+0x70/0x70 [ 2296.855891] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2296.855913] ? xfd_validate_state+0x59/0x180 [ 2296.855938] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2296.855970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2296.855995] ? lockdep_hardirqs_on+0x79/0x100 [ 2296.856018] do_syscall_64+0x3b/0x90 [ 2296.856035] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2296.856056] RIP: 0033:0x7f5b6be25b16 [ 2296.856069] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2296.856084] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2296.856099] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2296.856109] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2296.856118] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2296.856127] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000005 [ 2296.856136] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2296.856163] [ 2296.889866] loop2: detected capacity change from 0 to 215922 [ 2296.966097] loop6: detected capacity change from 0 to 215922 [ 2296.971949] FAULT_INJECTION: forcing a failure. [ 2296.971949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2296.971983] CPU: 1 PID: 9808 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2296.972010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2296.972027] Call Trace: [ 2296.972033] [ 2296.972042] dump_stack_lvl+0x8b/0xb3 [ 2296.972083] should_fail.cold+0x5/0xa [ 2296.972122] strncpy_from_user+0x34/0x3d0 21:24:40 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 88) [ 2296.972155] getname_flags.part.0+0x95/0x4f0 [ 2296.972181] ? kmem_cache_free+0xe0/0x420 [ 2296.972228] getname_flags+0x9a/0xe0 [ 2296.972264] vfs_fstatat+0x73/0xb0 [ 2296.972301] __do_sys_newstat+0x88/0x110 [ 2296.972333] ? __ia32_sys_stat+0x70/0x70 [ 2296.972368] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2296.972403] ? xfd_validate_state+0x59/0x180 [ 2296.972443] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2296.972489] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2296.972531] ? lockdep_hardirqs_on+0x79/0x100 [ 2296.972573] do_syscall_64+0x3b/0x90 [ 2296.972602] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2296.972642] RIP: 0033:0x7f5b6be25b16 [ 2296.972666] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2296.972713] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2296.972751] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2296.972774] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2296.972789] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 21:24:40 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x4b47, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2296.972810] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006 [ 2296.972834] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2296.972884] [ 2296.976957] loop4: detected capacity change from 0 to 215922 [ 2297.060176] loop6: detected capacity change from 0 to 215922 [ 2297.067702] FAULT_INJECTION: forcing a failure. [ 2297.067702] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2297.067721] CPU: 1 PID: 9811 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2297.067735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2297.067744] Call Trace: [ 2297.067748] [ 2297.067752] dump_stack_lvl+0x8b/0xb3 [ 2297.067773] should_fail.cold+0x5/0xa [ 2297.067788] strncpy_from_user+0x34/0x3d0 [ 2297.067812] getname_flags.part.0+0x95/0x4f0 [ 2297.067831] ? kmem_cache_free+0xe0/0x420 [ 2297.067856] getname_flags+0x9a/0xe0 [ 2297.067875] vfs_fstatat+0x73/0xb0 [ 2297.067896] __do_sys_newstat+0x88/0x110 [ 2297.067914] ? __ia32_sys_stat+0x70/0x70 [ 2297.067931] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2297.067952] ? xfd_validate_state+0x59/0x180 [ 2297.067972] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2297.067996] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2297.068016] ? lockdep_hardirqs_on+0x79/0x100 [ 2297.068034] do_syscall_64+0x3b/0x90 [ 2297.068049] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2297.068065] RIP: 0033:0x7f5b6be25b16 [ 2297.068075] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2297.068087] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2297.068099] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2297.068107] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2297.068115] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2297.068123] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006 [ 2297.068130] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2297.068151] [ 2297.087038] loop5: detected capacity change from 0 to 264192 [ 2297.097777] loop5: detected capacity change from 0 to 264192 [ 2297.109105] loop7: detected capacity change from 0 to 215922 [ 2297.121947] FAULT_INJECTION: forcing a failure. [ 2297.121947] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.121967] CPU: 0 PID: 9817 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2297.121983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2297.121993] Call Trace: [ 2297.121998] [ 2297.122003] dump_stack_lvl+0x8b/0xb3 [ 2297.122026] should_fail.cold+0x5/0xa [ 2297.122040] ? kobject_get_path+0xc0/0x1d0 [ 2297.122059] should_failslab+0x5/0x10 [ 2297.122078] __kmalloc+0x72/0x440 [ 2297.122103] kobject_get_path+0xc0/0x1d0 [ 2297.122124] kobject_uevent_env+0x25c/0xfa0 [ 2297.122143] ? kernfs_put+0x42/0x50 [ 2297.122168] __loop_clr_fd+0x2f8/0x8b0 [ 2297.122190] lo_ioctl+0x632/0x1990 [ 2297.122207] ? vfs_fstatat+0x97/0xb0 [ 2297.122231] ? loop_set_status_old+0x1b0/0x1b0 [ 2297.122248] ? avc_ss_reset+0x180/0x180 [ 2297.122281] ? __lock_acquire+0xbac/0x6120 [ 2297.122311] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2297.122332] ? lock_is_held_type+0xd7/0x130 [ 2297.122350] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2297.122373] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2297.122394] ? do_vfs_ioctl+0x132/0x1610 [ 2297.122415] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2297.122437] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2297.122452] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2297.122474] ? blkdev_bszset+0x1f0/0x1f0 [ 2297.122487] ? selinux_inode_getsecctx+0x90/0x90 [ 2297.122510] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2297.122532] ? __ia32_sys_stat+0x70/0x70 [ 2297.122553] ? loop_set_status_old+0x1b0/0x1b0 [ 2297.122573] blkdev_ioctl+0x356/0x7f0 [ 2297.122586] ? blkdev_common_ioctl+0x1990/0x1990 [ 2297.122600] ? selinux_file_ioctl+0xb1/0x260 [ 2297.122620] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2297.122641] ? blkdev_common_ioctl+0x1990/0x1990 [ 2297.122657] __x64_sys_ioctl+0x196/0x210 [ 2297.122680] do_syscall_64+0x3b/0x90 [ 2297.122695] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2297.122714] RIP: 0033:0x7f1d2141e8d7 [ 2297.122724] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2297.122738] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2297.122751] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7 [ 2297.122759] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2297.122767] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2297.122775] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008 [ 2297.122783] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2297.122805] [ 2297.128287] loop2: detected capacity change from 0 to 215922 [ 2297.158949] loop6: detected capacity change from 0 to 215922 [ 2297.165677] loop2: detected capacity change from 0 to 215922 [ 2297.166340] FAULT_INJECTION: forcing a failure. [ 2297.166340] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.166359] CPU: 1 PID: 9825 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2297.166373] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2297.166382] Call Trace: [ 2297.166385] [ 2297.166390] dump_stack_lvl+0x8b/0xb3 [ 2297.166411] should_fail.cold+0x5/0xa [ 2297.166424] ? create_object.isra.0+0x3a/0xa20 [ 2297.166446] should_failslab+0x5/0x10 [ 2297.166463] kmem_cache_alloc+0x5b/0x480 [ 2297.166489] create_object.isra.0+0x3a/0xa20 [ 2297.166503] ? kasan_unpoison+0x23/0x50 [ 2297.166522] kmem_cache_alloc_lru+0x2d3/0x7c0 [ 2297.166542] ? __d_alloc+0x31/0x990 [ 2297.166570] __d_alloc+0x31/0x990 [ 2297.166587] d_alloc_parallel+0x10a/0x1c00 [ 2297.166604] ? __lock_acquire+0x164e/0x6120 [ 2297.166633] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2297.166649] ? find_held_lock+0x2c/0x110 [ 2297.166665] ? __d_lookup_rcu+0x730/0x730 [ 2297.166682] ? lockdep_init_map_type+0x21a/0x7e0 [ 2297.166700] ? lockdep_init_map_type+0x21a/0x7e0 [ 2297.166723] __lookup_slow+0x193/0x490 [ 2297.166741] ? page_put_link+0x1f0/0x1f0 [ 2297.166759] ? p9_pollwake+0x100/0x170 [ 2297.166782] ? p9_pollwake+0x100/0x170 [ 2297.166798] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2297.166818] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2297.166836] ? link_path_walk.part.0+0x154/0xf80 [ 2297.166856] walk_component+0x411/0x6a0 [ 2297.166872] ? handle_dots.part.0+0x1500/0x1500 [ 2297.166888] ? path_init+0x17b0/0x17b0 [ 2297.166911] path_lookupat+0x1ba/0x850 [ 2297.166933] filename_lookup+0x1c6/0x590 [ 2297.166951] ? may_linkat+0x500/0x500 [ 2297.166974] ? find_held_lock+0x2c/0x110 [ 2297.166991] ? lock_release+0x3b2/0x750 [ 2297.167006] ? __might_fault+0xd1/0x170 [ 2297.167025] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2297.167043] ? __virt_addr_valid+0xe9/0x350 [ 2297.167061] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2297.167079] ? is_vmalloc_addr+0x7b/0xb0 [ 2297.167095] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2297.167113] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2297.167131] ? __check_object_size+0x1b5/0x890 [ 2297.167153] vfs_statx+0x148/0x390 [ 2297.167175] ? inode_sub_bytes+0x100/0x100 [ 2297.167192] ? getname_flags.part.0+0x1dd/0x4f0 [ 2297.167207] ? kmem_cache_free+0xe0/0x420 [ 2297.167233] vfs_fstatat+0x8c/0xb0 [ 2297.167254] __do_sys_newstat+0x88/0x110 [ 2297.167272] ? __ia32_sys_stat+0x70/0x70 [ 2297.167289] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2297.167307] ? xfd_validate_state+0x59/0x180 [ 2297.167327] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2297.167353] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2297.167373] ? lockdep_hardirqs_on+0x79/0x100 [ 2297.167392] do_syscall_64+0x3b/0x90 [ 2297.167406] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2297.167424] RIP: 0033:0x7f5b6be25b16 [ 2297.167434] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2297.167447] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2297.167459] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2297.167468] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2297.167476] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2297.167484] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006 [ 2297.167491] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2297.167513] [ 2297.265166] loop4: detected capacity change from 0 to 215922 [ 2297.287769] loop4: detected capacity change from 0 to 215922 21:24:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xffffffff00000000, 0x0) 21:24:56 executing program 5: syz_read_part_table(0xfffffdfd, 0x0, 0x0) 21:24:56 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:24:56 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x4b49, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:24:56 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 94) 21:24:56 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xb3e5960600000000, 0x0) 21:24:56 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2288, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:24:56 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 89) [ 2312.526059] loop5: detected capacity change from 0 to 264192 [ 2312.555071] loop7: detected capacity change from 0 to 215922 [ 2312.563731] 9pnet_fd: p9_fd_create_tcp (9840): problem connecting socket to 127.0.0.1 [ 2312.593309] loop6: detected capacity change from 0 to 215922 [ 2312.598974] loop2: detected capacity change from 0 to 215922 21:24:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfffffffffffff000, 0x0) [ 2312.624159] FAULT_INJECTION: forcing a failure. [ 2312.624159] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.624187] CPU: 1 PID: 9850 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2312.624206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2312.624217] Call Trace: [ 2312.624223] [ 2312.624231] dump_stack_lvl+0x8b/0xb3 [ 2312.624259] should_fail.cold+0x5/0xa [ 2312.624279] ? create_object.isra.0+0x3a/0xa20 [ 2312.624313] should_failslab+0x5/0x10 [ 2312.624337] kmem_cache_alloc+0x5b/0x480 21:24:56 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 90) 21:24:56 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 95) [ 2312.624374] create_object.isra.0+0x3a/0xa20 [ 2312.624513] ? kasan_unpoison+0x23/0x50 [ 2312.624539] kmem_cache_alloc_lru+0x2d3/0x7c0 [ 2312.624564] ? __d_alloc+0x31/0x990 [ 2312.624591] __d_alloc+0x31/0x990 21:24:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfffffffffffffffe, 0x0) [ 2312.624617] d_alloc_parallel+0x10a/0x1c00 [ 2312.624636] ? __lock_acquire+0x164e/0x6120 21:24:56 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xf6ffffff00000000, 0x0) [ 2312.624677] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2312.624700] ? find_held_lock+0x2c/0x110 [ 2312.624722] ? __d_lookup_rcu+0x730/0x730 [ 2312.624744] ? lockdep_init_map_type+0x21a/0x7e0 [ 2312.624770] ? lockdep_init_map_type+0x21a/0x7e0 [ 2312.624801] __lookup_slow+0x193/0x490 [ 2312.624824] ? page_put_link+0x1f0/0x1f0 [ 2312.624850] ? p9_pollwake+0x100/0x170 [ 2312.624882] ? p9_pollwake+0x100/0x170 21:24:56 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x2289, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2312.624903] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2312.624930] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2312.624956] ? link_path_walk.part.0+0x154/0xf80 [ 2312.624985] walk_component+0x411/0x6a0 [ 2312.625008] ? handle_dots.part.0+0x1500/0x1500 [ 2312.625033] ? path_init+0x17b0/0x17b0 [ 2312.625064] path_lookupat+0x1ba/0x850 [ 2312.625095] filename_lookup+0x1c6/0x590 21:24:56 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 91) [ 2312.625122] ? may_linkat+0x500/0x500 [ 2312.625156] ? find_held_lock+0x2c/0x110 [ 2312.625178] ? lock_release+0x3b2/0x750 [ 2312.625198] ? __might_fault+0xd1/0x170 [ 2312.625224] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2312.625252] ? __virt_addr_valid+0xe9/0x350 [ 2312.625276] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2312.625301] ? is_vmalloc_addr+0x7b/0xb0 [ 2312.625323] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2312.625350] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2312.625376] ? __check_object_size+0x1b5/0x890 [ 2312.625408] vfs_statx+0x148/0x390 [ 2312.625442] ? inode_sub_bytes+0x100/0x100 [ 2312.625482] ? getname_flags.part.0+0x1dd/0x4f0 [ 2312.625505] ? kmem_cache_free+0xe0/0x420 [ 2312.625542] vfs_fstatat+0x8c/0xb0 [ 2312.625574] __do_sys_newstat+0x88/0x110 21:24:56 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5382, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2312.625602] ? __ia32_sys_stat+0x70/0x70 [ 2312.625628] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2312.625654] ? xfd_validate_state+0x59/0x180 [ 2312.625681] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2312.625720] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2312.625750] ? lockdep_hardirqs_on+0x79/0x100 [ 2312.625778] do_syscall_64+0x3b/0x90 [ 2312.625799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2312.625823] RIP: 0033:0x7f5b6be25b16 [ 2312.625836] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2312.625849] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2312.625865] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2312.625875] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2312.625886] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2312.625897] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000007 [ 2312.625907] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2312.625940] [ 2312.637861] FAULT_INJECTION: forcing a failure. [ 2312.637861] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.637891] CPU: 1 PID: 9846 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2312.637910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2312.637922] Call Trace: [ 2312.637928] 21:24:56 executing program 5: syz_read_part_table(0xffffff97, 0x0, 0x0) [ 2312.637935] dump_stack_lvl+0x8b/0xb3 [ 2312.637961] should_fail.cold+0x5/0xa [ 2312.637981] ? create_object.isra.0+0x3a/0xa20 [ 2312.638009] should_failslab+0x5/0x10 [ 2312.638034] kmem_cache_alloc+0x5b/0x480 [ 2312.638068] create_object.isra.0+0x3a/0xa20 [ 2312.638092] ? kasan_unpoison+0x23/0x50 [ 2312.638119] __kmalloc+0x25b/0x440 [ 2312.638154] kobject_get_path+0xc0/0x1d0 [ 2312.638181] kobject_uevent_env+0x25c/0xfa0 [ 2312.638210] ? kernfs_put+0x42/0x50 [ 2312.638245] __loop_clr_fd+0x2f8/0x8b0 [ 2312.638274] lo_ioctl+0x632/0x1990 [ 2312.638299] ? vfs_fstatat+0x97/0xb0 [ 2312.638331] ? loop_set_status_old+0x1b0/0x1b0 [ 2312.638354] ? avc_ss_reset+0x180/0x180 [ 2312.638398] ? __lock_acquire+0xbac/0x6120 [ 2312.638445] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2312.638475] ? lock_is_held_type+0xd7/0x130 [ 2312.638500] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2312.638531] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2312.638560] ? do_vfs_ioctl+0x132/0x1610 [ 2312.638590] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2312.638622] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2312.638641] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2312.638671] ? blkdev_bszset+0x1f0/0x1f0 [ 2312.638690] ? selinux_inode_getsecctx+0x90/0x90 [ 2312.638720] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2312.638752] ? __ia32_sys_stat+0x70/0x70 [ 2312.638783] ? loop_set_status_old+0x1b0/0x1b0 [ 2312.638812] blkdev_ioctl+0x356/0x7f0 [ 2312.638831] ? blkdev_common_ioctl+0x1990/0x1990 [ 2312.638850] ? selinux_file_ioctl+0xb1/0x260 [ 2312.638879] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2312.638909] ? blkdev_common_ioctl+0x1990/0x1990 [ 2312.638936] __x64_sys_ioctl+0x196/0x210 [ 2312.638969] do_syscall_64+0x3b/0x90 [ 2312.638991] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2312.639017] RIP: 0033:0x7f1d2141e8d7 [ 2312.639031] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.639048] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2312.639065] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7 [ 2312.639078] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2312.639089] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2312.639101] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008 [ 2312.639112] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2312.639145] [ 2312.666972] loop4: detected capacity change from 0 to 215922 [ 2312.692806] loop2: detected capacity change from 0 to 215922 [ 2312.733829] loop5: detected capacity change from 0 to 264192 [ 2312.784917] loop6: detected capacity change from 0 to 215922 [ 2312.791088] FAULT_INJECTION: forcing a failure. [ 2312.791088] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.791113] CPU: 1 PID: 9861 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2312.791132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2312.791143] Call Trace: [ 2312.791148] [ 2312.791154] dump_stack_lvl+0x8b/0xb3 [ 2312.791178] should_fail.cold+0x5/0xa [ 2312.791197] ? create_object.isra.0+0x3a/0xa20 [ 2312.791223] should_failslab+0x5/0x10 [ 2312.791245] kmem_cache_alloc+0x5b/0x480 [ 2312.791276] create_object.isra.0+0x3a/0xa20 [ 2312.791297] ? kasan_unpoison+0x23/0x50 [ 2312.791322] kmem_cache_alloc+0x239/0x480 [ 2312.791353] getname_flags.part.0+0x50/0x4f0 [ 2312.791375] ? kmem_cache_free+0xe0/0x420 [ 2312.791403] getname_flags+0x9a/0xe0 [ 2312.791427] vfs_fstatat+0x73/0xb0 [ 2312.791456] __do_sys_newstat+0x88/0x110 [ 2312.791482] ? __ia32_sys_stat+0x70/0x70 [ 2312.791507] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2312.791532] ? clockevents_program_event+0x131/0x350 [ 2312.791554] ? tick_program_event+0xb4/0x140 [ 2312.791583] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2312.791611] ? hrtimer_interrupt+0x5b0/0x770 [ 2312.791648] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2312.791677] ? lockdep_hardirqs_on+0x79/0x100 [ 2312.791702] do_syscall_64+0x3b/0x90 [ 2312.791722] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2312.791744] RIP: 0033:0x7f5b6be25b16 [ 2312.791757] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2312.791771] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2312.791787] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2312.791798] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2312.791808] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2312.791818] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000007 [ 2312.791828] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2312.791855] [ 2312.938004] loop6: detected capacity change from 0 to 215922 [ 2312.945857] FAULT_INJECTION: forcing a failure. [ 2312.945857] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.945885] CPU: 0 PID: 9865 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2312.945904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2312.945915] Call Trace: [ 2312.945925] [ 2312.945932] dump_stack_lvl+0x8b/0xb3 [ 2312.945955] should_fail.cold+0x5/0xa [ 2312.945971] ? create_object.isra.0+0x3a/0xa20 [ 2312.945997] should_failslab+0x5/0x10 [ 2312.946019] kmem_cache_alloc+0x5b/0x480 [ 2312.946052] create_object.isra.0+0x3a/0xa20 [ 2312.946073] ? kasan_unpoison+0x23/0x50 [ 2312.946097] kmem_cache_alloc+0x239/0x480 [ 2312.946128] getname_flags.part.0+0x50/0x4f0 [ 2312.946150] ? kmem_cache_free+0xe0/0x420 [ 2312.946180] getname_flags+0x9a/0xe0 [ 2312.946208] vfs_fstatat+0x73/0xb0 [ 2312.946238] __do_sys_newstat+0x88/0x110 [ 2312.946264] ? __ia32_sys_stat+0x70/0x70 [ 2312.946289] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2312.946315] ? xfd_validate_state+0x59/0x180 [ 2312.946344] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2312.946381] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2312.946408] ? lockdep_hardirqs_on+0x79/0x100 [ 2312.946436] do_syscall_64+0x3b/0x90 [ 2312.946457] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2312.946481] RIP: 0033:0x7f5b6be25b16 [ 2312.946495] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2312.946512] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2312.946530] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16 [ 2312.946542] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40 [ 2312.946553] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2312.946563] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000007 [ 2312.946574] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2312.946605] [ 2312.997757] loop4: detected capacity change from 0 to 215922 [ 2312.998055] loop2: detected capacity change from 0 to 215922 [ 2313.020378] loop7: detected capacity change from 0 to 215922 [ 2313.020800] loop5: detected capacity change from 0 to 264192 [ 2313.028355] FAULT_INJECTION: forcing a failure. [ 2313.028355] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2313.028382] CPU: 0 PID: 9877 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2313.028406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2313.028417] Call Trace: [ 2313.028422] [ 2313.028430] dump_stack_lvl+0x8b/0xb3 [ 2313.028456] should_fail.cold+0x5/0xa [ 2313.028479] strncpy_from_user+0x34/0x3d0 [ 2313.028511] getname_flags.part.0+0x95/0x4f0 [ 2313.028535] ? kmem_cache_free+0xe0/0x420 [ 2313.028575] getname_flags+0x9a/0xe0 [ 2313.028602] vfs_fstatat+0x73/0xb0 [ 2313.028633] __do_sys_newstat+0x88/0x110 [ 2313.028661] ? __ia32_sys_stat+0x70/0x70 [ 2313.028687] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2313.028715] ? xfd_validate_state+0x59/0x180 [ 2313.028744] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2313.028783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2313.028814] ? lockdep_hardirqs_on+0x79/0x100 [ 2313.028844] do_syscall_64+0x3b/0x90 [ 2313.028866] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2313.028891] RIP: 0033:0x7f1d2141db16 [ 2313.028905] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2313.028923] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2313.028942] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16 [ 2313.028956] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40 [ 2313.028968] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2313.028980] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000007 [ 2313.028990] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2313.029023] [ 2313.033442] loop5: detected capacity change from 0 to 264192 [ 2313.034675] loop2: detected capacity change from 0 to 215922 21:25:14 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xffffffffffffffff, 0x0) 21:25:14 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:25:14 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x4b47, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:14 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 96) 21:25:14 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 92) 21:25:14 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfcfdffff00000000, 0x0) 21:25:14 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5385, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:14 executing program 5: syz_read_part_table(0xfffffff6, 0x0, 0x0) [ 2330.440068] loop5: detected capacity change from 0 to 264192 [ 2330.451193] 9pnet_fd: p9_fd_create_tcp (9891): problem connecting socket to 127.0.0.1 [ 2330.459473] loop4: detected capacity change from 0 to 215922 [ 2330.471395] loop2: detected capacity change from 0 to 215922 [ 2330.491016] loop7: detected capacity change from 0 to 215922 [ 2330.494755] loop5: detected capacity change from 0 to 264192 [ 2330.509138] FAULT_INJECTION: forcing a failure. [ 2330.509138] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.509159] CPU: 0 PID: 9904 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2330.509172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2330.509181] Call Trace: [ 2330.509185] [ 2330.509190] dump_stack_lvl+0x8b/0xb3 [ 2330.509211] should_fail.cold+0x5/0xa [ 2330.509224] ? create_object.isra.0+0x3a/0xa20 [ 2330.509245] should_failslab+0x5/0x10 [ 2330.509262] kmem_cache_alloc+0x5b/0x480 [ 2330.509285] create_object.isra.0+0x3a/0xa20 [ 2330.509300] ? kasan_unpoison+0x23/0x50 [ 2330.509317] __kmalloc+0x25b/0x440 [ 2330.509340] kobject_get_path+0xc0/0x1d0 [ 2330.509359] kobject_uevent_env+0x25c/0xfa0 [ 2330.509376] ? kernfs_put+0x42/0x50 [ 2330.509398] __loop_clr_fd+0x2f8/0x8b0 [ 2330.509418] lo_ioctl+0x632/0x1990 [ 2330.509434] ? vfs_fstatat+0x97/0xb0 [ 2330.509455] ? loop_set_status_old+0x1b0/0x1b0 [ 2330.509470] ? avc_ss_reset+0x180/0x180 [ 2330.509500] ? __lock_acquire+0xbac/0x6120 [ 2330.509526] ? lockdep_hardirqs_on_prepare+0x400/0x400 21:25:14 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfeffffff00000000, 0x0) 21:25:14 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r2 = socket$inet_udp(0x2, 0x2, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)={0xfffffff9, 0xe385, 0x200, 0x9, 0x80000, 0x7f}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000007500)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0) r7 = inotify_init() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007780)={0x0}, &(0x7f00000077c0)=0xc) lstat(&(0x7f0000007800)='./file0\x00', &(0x7f0000007840)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 2330.509545] ? lock_is_held_type+0xd7/0x130 [ 2330.509565] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2330.509585] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2330.509604] ? do_vfs_ioctl+0x132/0x1610 [ 2330.509623] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2330.509643] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2330.509655] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2330.509674] ? blkdev_bszset+0x1f0/0x1f0 [ 2330.509686] ? selinux_inode_getsecctx+0x90/0x90 [ 2330.509706] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2330.509735] ? __ia32_sys_stat+0x70/0x70 sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007940)={&(0x7f00000003c0), 0xc, &(0x7f00000076c0)=[{&(0x7f0000002900)={0x2e4, 0x22, 0x100, 0x70bd2d, 0x25dfdbfd, "", [@nested={0x24b, 0x8c, 0x0, 0x1, [@typed={0x8, 0x35, 0x0, 0x0, @uid}, @typed={0x8, 0x70, 0x0, 0x0, @ipv4=@loopback}, @generic="3391a18038f95f424b832912ceb4b73dde7a2ef16d72857379dbf3fb0e6fd08508c4c251c7008534a50e858d530c5c46bbdcc2943981fa2967b1b4bb5f8713618f48e9afed6687ae3a72b6e5a98337ebb851cedbf5173b6aa2afd2c564e823bb35edde7d5f8132089311537110f87c255e55d9eedfd081f83fb8842ba712547c44ff710f7802e6d7d10377249a39577c330964c3b4cc473f7d7ae30c0853c6766c", @generic="4e3aa8b456cb0d6c8d02fcb76b0b7282228b2055387573b35954b17d7d11101dd092fe62dfaced9fcce0d55ce94363ab8b0e74791446abb5c652f6135066415bf78a5687da80117a8fa81381faa80449c411f7ba5b679ec433830acd3a0b4525aeefdbeda06ee1d85f2d5b4855a29ee8abe4566d700852edfe309d6564840633203be9849318f9b27904d5b60f3a7c763b7591db4eff28ad6183129d078a46fd5b168c70e5a4eff90523dbad02ed2fcdacbf12fc7a1f8ce0b5027e593a6c668d65e8f390e1b318ea86", @generic="8e677d1d5bd4e6feebfe443f2a553e608ac9a2b9c12c058ca71b2ab53f9a678d4e3a1ca65c1cba04bdafcc612739ffa0764790b4e552726f50e0676ac015cfbd4f354ca7ad1a4cfc1d96d770c6daf338defa091428aae9b51a3495a4ebd71b8c65e9189203c2cb2ecb867b3772ca2a0e0682fd4f614739bf9ab4e5f4b7cf514236b89184943f4ee9f9040f3ca1c70b5601b07f2a80ef766dab95e32cf99fdcd330f4b58450646f9e62535da4f62a6e87e4592ac29666142db5c001baabaab57ce27c25e42920fbb8617fe8bbd4"]}, @generic="35bfe07b67960c1672b791197682a4012b93272f1e649243efcb86c50e3f", @generic="c60c015e7fa3325a956d405dd4695dd300ea5b6d6cd5af265a56ecaf9151b9441de1088b0d708b974b869bfa3d4d5edb3bbc556d3e5bd6893c53fbf6d637ea0a0ce4cbf577749476e55e25b8f1452385cc21bc141f22a6cc53e4d105ab2db2ac28e022df0d7008e8"]}, 0x2e4}, {&(0x7f0000002c40)={0x1230, 0x27, 0x200, 0x70bd27, 0x25dfdbfe, "", [@typed={0x8, 0x16, 0x0, 0x0, @u32=0x2b4a}, @typed={0x14, 0x5d, 0x0, 0x0, @ipv6=@mcast2}, @nested={0x48, 0x94, 0x0, 0x1, [@generic="afe31f493d80aa1d59e5411186174fc64f4a50f22984cb8758ca4705b5d10adf29736175c70ca1bd06e323d71d6f7fa7d53973fa7864e7ecfb2eeeb3e346b79bd6cf35d0"]}, @typed={0x4a, 0x5, 0x0, 0x0, @binary="6ba31c27cf1ab1de8c1a4d1c797267d291308a33d3a5e2da9c7e0fea6eef866587292b2f0dfbe90dc8f4b9afbd578a351eed1b5d24a384834ab9f2c72c3b112d55dbad1801fd"}, @nested={0x162, 0x4e, 0x0, 0x1, [@generic, @generic="886ebfb19ec8370d2c32fbb1606c284b0e800edf0edd51b0323ea7a48a1b2f71aa15ea364a4398549fd71ecca19aa97d56ad4fee574dfea4d24f7069bca5a81f2b048e18d697a1e98103173c95f347e62ffa0b39113a8d76387732d65c716b895b4c9f565fe378c334149b378243fdd31548e27d91d5c68765f3afda8ddbc79667fd0aca7ade59562d965de3f4be74a86c5cbd69a0da49b09b3f6f3eeeacae1933d2bd25466cb361c9ead2948f47374b1a148a0d7623eaeb61ce8aafb374dba02280624a2f33688c3cda40b0b52108bec59e0a", @generic="6e215b942cb6f765084387d535165463a1a7d57e34d4a64786aedde021e691cd551c2062722640a1536ecaa2cb7e60e9475deab8b9c18bc8822bd372c92c1d73785d68831eaa43b1256c69f0889aec7f69e9fbb9daa2e1d7790bac666b5774a6192191f2d315a2d984b38a3a784566", @typed={0x8, 0x88, 0x0, 0x0, @u32=0x3}, @typed={0x8, 0x80, 0x0, 0x0, @ipv4=@loopback}, @typed={0x4, 0x4a}, @typed={0x8, 0x8a, 0x0, 0x0, @u32=0x8}]}, @typed={0x8, 0x32, 0x0, 0x0, @pid}, @typed={0x1004, 0x59, 0x0, 0x0, @binary="4ce6ef3abee5a062df50cfd4166c0865b5f0e174072c79d059bd6369dad958c71514702d55e37afa7991722d608bbe91a92f98dd984693d9f8252d4546e0dc4369e685438027e5e518eb8a3f700ce68933eb9d96dd87566d1236c94df5f173d738f83848318dd81e2d6dbbe71c3ee5327a77e81e8b5fa46564003bbde1b9b283fba1899790199451791a2618aee024229d560459dd7d27652233fd7493a769a2fbf5cfa9f3d1f9a8dd1b7daa1abe5969202ceeede8d44db3d4509cabfe5f6b6e076aa038183589100eb4741def2bc7983276b4882002a09485046b583b390b5c53e18d993f0a966dd6923cb8ee3acdad78532c6998f6b19b164d7e41295a58a6e1214bb6e8710e271a704e73e2629cac1e855e22101b570ceb3a9d6f2b764f8129e9047dab896f77a46f0645e76baf1e4e7b071f08e2be4291e08e7cf8db6a17e7d6c5f6c18c0507826482ebafe7bb25f40526f4826fd493ff4cbd4764b77899ebfdd5702b6dcf8eb92d4a535a6c145dc39ac6c3f7e402b4bf50ee1d314c714dbfb65229ce4080ac242a9e4560b12921a45735b54e877f9c9401f05c2e0243c6ca73d5392d83c5ad1400141f5a2474bfbe1c5842d033734c17a8bd49287ba7a0c70be4a7af749dd0dfa8c366d81cd3e3cc6feebee25be6af7c77a5fcb8dcaa30812e2f8f2a01da1a9f326ad7b0afe0257ee4d461aee2e31b2160ccb5fd5406af220184a192f4f779c9029a3ee4605496141e8720d3d034b41b29816b5d29e5df22fe01d5a6752fb161593f8d37ef759237a35d6d7a6fe2ac060d6ee9c5963f30fa47a9412bfadae0bc44f1123efdd40a5f8582a111a0c0465be90ed34cce8e070ce33fe4da23d1b3e4ce20d4b36d1c2e89cc71dd9ca53e284b1c97252db2332a7133c81ca672df7b45317e4fa9f0dd1a7d5894ea6f621a79d25270e5253df59207299ab6dd346d97871e406168158b77b1680ab2c184f1d7e3dd4d0910cdfcadb8f76589cfa852a1bad28fda870dae2118b029700753da02d01a66a5208b9fce8455077ed876ad60c9a38f53ddddfe488786870c0c5166fc4d9da6fe7e1951db1b4d8dc732a78bc0369e0be77357be27dc11ef6d76e0a7ccca66ad999e4fcf5c00b456a0565de042698f47709625c11856d78621d74709b4b6ccb27bc7424bc873c43c9c7710dcb93e43c55c249344b78327b14238dc95f12e3a861a6c96a4b52caa3c6b1220c7dab6aa5df136e87bac8d6a0550ff312fbdee823e4c4a03ee45188e4a1c660c1ce29752627e91dcd182a57952d0fe65b4715cd4ae772a1407c4f1424e557675699cdd543d1fcce063e9982d1d1d25b1c86ce44466a518e1ae777587d835209012ab042e31a876252bbf477fbb5c6ed15d11f2a9f0c126f95b6dd86ad9f8b18700ff2c6f5fc65649ac4425ba0a560657124261baffbe5520a3c9bb5cbfb58fd2ff7bfd62bd0122f2d810f773905efba6f4a268f4e733631af88532c1b99fe113b186748ecd86b571339bccee7239fc3d0c5dba0e8bff4d415643468566b123b161a9e621a3622aa768caac4825eb7f5a2cfd1a0bf8c3b12a4367b908c844362f565ff4c8786a7bc12cb8d4b4cb0f3b47d5e2043715ba1a1bc89eaa8e3facc52ee391172d0f753bc09526e975fbc48b49b823f0063c2815d00ccbca4fbb7dcbd94670b54de6ec74fe1f674a74e460f637bbc586ec278aee5ae86fcdd812f740f765ac3b04191912350f3844e66475db5eb95ec89c545f5aaa509df3109b61cf4d4da34270f89ab10314d8c66c55495acb00d2519d5585044cdcb46dc070e88a74ef9a60a11b67d3e1985431c60f803981aae2584a6ccdce1f9f91075cfd5f064d47af75f8ce6f41113c11365c31c0f2bc1581a1da33ed115540b8f0d46d4bafa99dd600496269dc4b8addc9ce9173028aaeaf478d1f217b7c8283183a0f58920a1b629b25f36b1b6f511f78a9753e25ddfc21c6a16117ba4a1e2d6c2b54216c1c8a3e724ba8ace0dc341e7631af17f3cfe3995ec9a9d7b7878809ea261272d56702f766b66360bc5a8890f37c91f35a61cb74aa3c68538218b44b1187dff781be117170e3dd5e726a0675dad22811296fb5532f7951641c017b28c78e03ca81f74151b12a1ae53b2b2cf61645e09ac783bea977f1e823afb9c8051b15c2ccbec468de268fbc2166683574e18add969a52e0d3dfc647334982580ddb09fb2f104c2caf118af2e2f3fadfe710c2b96b31645f395866baf4689c7f157b0f54e247f3bb42f100a18a37bd996573fb2a73a2c2ebff900008b8897f144639888421450205ab11048e4214548d7af7a8980aff87ad84568358568613f584e131485752d66470af93281788eee6ea1bdf64505f7979444dfe4bf5ee36207aa3dce2d3c95479caba012bd47e20513551101192cd01641d035f79148bffc14298bcc0c722b1c0bf3d23a6e315afd189ffdd961b3e56a115a9869ef77a3b09b1041a7fee3f0c01cc813fef8c24b227649ec3538f143a1b3157ed5330b548f7f745d1c3ab740df374f75edd5d22ce211379ff75b8037a8aefca4e19ab7b4fd8024cf3821d8dffff1cd8f8e05a6858bb9cf4407ed68dcaaaf44b65e94d8c4397d2f7ab2488b87f07a1aa51006cf87c754582d159afae48c50ce04686a6d613710726e4e4b4e8925c4ca1ab67dc9a22d4450c4809bea3efe45ef67dd25d61b4e695d7f4089f584636227d24f39a67c3242be012f13b136858054be281396dc8a6d6be882b14fafc4f798eb06727417813e9493550e55d7703c057d923a75001a4696f6169a49de8640042f6ca9484dc1f3aeb0dfbe5a51fd286619e3a602e33dc3eb454ff0337c995136151327ed4ae597fe3b43172be23a55f962a16a714acbb128bb03628f7163282e7bb4e0f8a3ed8ea73d6c41e0c3f829eb060b16076d719339a59f6f77715ecfad3a7ac8c1582c5b2d57505ab8d42522e96295dfd5ce381832bf80a00cece1b5c1f654a2579b939ad18d846ec0c77297f929274af26c082905a449d18731626ec9b9d68ec0e0c885391037a7e07c8653b13e8dfb05ff330b04f08781a0acf9ef6e8e85fc557419bf65891603903b7808e8937195b36e7d8a03a34f4392eceab4906ed6cb8f6062e19d2e9fccdd6e5fbdf799768f1a756be4c72cd5795e7622215c4e51b38fcde7c9b12086b682b4a6dbb849b4c51a87960006c34644dbc0a90821a89b6c34e141ef81e19a45e7db00ee311ac4721b4f429fd5cc687fac737ed5f61c2fe94c765e20d239d43032a5c3335e161d0d90e4c8070a7339ee7d0cdfebfc15744c70f476019103175354e182a9580719f27c71e34c9cc546345b78e0fd46d85b681af84481f467e871f3bea0073497296006d70b07f7fdb83bafa00ec21dd70ef977e47d4fc8fd0fda192fd05f13ab548e33be60fd5471421087d06e53e34f44247091a9025f0cedf05e4b5c3e95cd236ec09ef1493a27c1a18b80b592bdf89a411d8ab2d5a7194e4a281f4db8b908c9343cc680d54fdb69ee46033329c8be17302137b9cca957b8bfa84ccc1189296427dece27353901aa8c4af616deae07735b414cca441125e6f77b51410db659bc2238cf5ebdd80492d9f5bcc2a9d9378d48899c8de7233acace572cbf74439856a4f966bcf526e8d41e0ec8f5c762cacf554b62d866c7ea2194306a3545f5efcb872faec85156d0f35adffe32b8ce7b3f074d5219e187efec722685deea6fe832cca2e6b96d4d07ca77e356d6ce72e9781203f465b235544fa90f97c9e9d818fd0666e987a6e5686c874b67ef8d999e7415e660198e54b4cbfae4bd0357c6791f19f2b8b9dbb1dfbceaed4ff11e34fa7f7afa5439d2c6be8692690e28becbd5439cad25b3b889f0fac57b9a8e07628f879a24f55bc9f587835a5adc56e45856a92d2f6442bebd30e9696c923c3aa01f15c99be88d9cbe5f053ac7c30eff621f9d36c9ced6ddf7607979e46615e17c9d254b92aba0fbec67d17048457aca434fc697bdf581451408a41934894e0bc2954bd672d1207e25adaf56c2a594ae11179fe9ecd172df2a1e3efd54d96256ee814bf078718e4a32e126db25e0dc63c382ed4a569ff1efade05f88e5955bc4f68fc18f4301079ba71137fd2db69a34e48fe71906dc0b60257f32bca5df83b60f5c556e0adcfb18aa0cbbc168ce114794a390f087d9bca6539ae91773d5aa4a3021d12a12374abe33aa51a0a98d4735b55e5a8652056c21c08efa363267d03685cadebb712a757cb599db03e55bf9a1b2c70dcb5885f2b04b47980b2ac9303a239c8b29cec86691cbab2147a4c8d0c1f7c38de6588d31c7b48ff090cb7d55bcf80c60bac17c948df735aaa199221eceea35d152122370f0d7564627737b6f43885a7ff7cf67b23aacccc84c66009ad72536cd2a949a06698fc039ea5ce98432a58472e136a72584050105ba5e95e728a0aab384bfc73f565ed5cb1c87f88aa5ab40cb76e6d477151a68aeb6a59519af5d4d34cae600063e747b2f36c6137e0cffa3e5227bdf32c35a47037326db257995cad3851cc33e41f9ad578bbf9b86dfb2c3bade4291bb3486301d1fad42c01a2272ee7410db9487b60e224507805bca1f2d606e7ab7c7a176002809cdfc51b84f82d13594f8c15ad52211166bd4e9833026dcf43b6214476507428cb83e20f6b332b67dd278a4186178860e87a5d705bc674e784a825ff8764b1269aee42c21823b990de075351e8ee1fb164c2729815e71dff6577ded76785aa0a103da6fc79a21779f5c02267f6b963634ee924b3af64af069132236c4b8850af1ad5bd8e65242cb3ca00d851ce48e8afa10647753b5c5f6462060c31bbe3046136202c2cde561d8896c78298b2dbe81e33ff3a0ec44a913a79c167e2bdc13d1f1ec5ab19f249f8dc203febe6ce18944684c9922140ae1cb4c069b1d613320787d6c8c0f4a62a01e016e34815924e5c8f2a50917b6a9f3f2317528674b98fe0b4ffba1c5305a0646673a7627fd10b8ccdde941a25104a4f0dc1290117b5780e379e48d1c7e36d11754cde80867e25e2eb66262785118846cc8a52d26e7c2b3193f8bdedb8c6416fd908db6a42087707144d18f2ab1ec60f71a2855e1faa859f5e07235c8dc485c3d287c4a2e28be0065db7a34148364255b3667b2a3e21a9cdddafdcf5432fe743148f644e9eb44b925c67f0308d0e2b2fd8cb9449b7c528f20241c3f33619987281879a1519a620457b98ed1464b185569a7f11ea2d657f60ae7f3cadac61301c3b841a2700dec160e2edb609d67139770b4792972b37df73392fe33b1d2bebe668b1335f17c370e4d0075f721ba9b3e16f4e5e559abc1c39c7e97cea874f3debee8317b56dbb6c834c16369aeb4e43f38b2467d497244242be3a90ecb482be83a0daf40d20b18bf1c93157b5cdf31e1af69f6792c9ea7ff6ddc09227caac407087d9449a4ece5e50820bfe798fab9c485685845582a20af7a4f4123376a44cda69c12f9a0c71cc97061c55bc909031550788a9081933ff09d2e099b3ac7c61a933dbf1bdb156aa09b5580c4c510aa4cfc7bdb463d50265712d4baab249b1c8bc0ddf1ee531a5e5da56c4b45b081d3697d7f865717d9f512b55b93ee98e07c9ff4b5ba278e1e6c8e2ae97a3ef5c111036ad6da78673892e707bb8ab456ffa9eed410c1fe466731f8e14407758777a8b50486fbd651bfac8d11af0338b5172c73b7736d0f70876a53b6cc6238aafd1e17765afebf9732ff88ba212c1508c34462013ca0f4ea2af"}]}, 0x1230}, {&(0x7f0000003e80)={0x58, 0x29, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@generic="0e212d520d916aec6388d960b854ddaf134f3c27517e2f0f03bbfde703278d2fd7d5380e3844c1f35a9b92c34650857f04354eee1c9ffea2a7a1e5092f873e16eb6ff8081fc5"]}, 0x58}, {&(0x7f0000003f00)={0x20d4, 0x24, 0x200, 0x70bd2a, 0x25dfdbfc, "", [@typed={0x4, 0x1}, @typed={0x8, 0x7, 0x0, 0x0, @ipv4=@multicast1}, @nested={0x1096, 0x8, 0x0, 0x1, [@generic="b3a6918a8de71f445425c512bb453abe1b8bd76ce838549a2976b8d555d6a98f6621d0d834ae7110ec0cd7e385d70b3b40436a0805973dd7c862ba8821fd5c87d653baa973d0ebe0ee1cfb80d7ebd83490db79581c97c1c6ac5268a5623b858123f2b8aac3ebdd194808247769a38f9137891a27050df50fd8644d9030823a41510df89d18d95dcf56db", @typed={0x8, 0xf, 0x0, 0x0, @uid=0xee00}, @generic="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"]}, @nested={0x101e, 0x86, 0x0, 0x1, [@typed={0x8, 0x1e, 0x0, 0x0, @uid=0xee01}, @generic="e501538962dd", @generic="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", @typed={0x9, 0x3f, 0x0, 0x0, @str=',@\xe3Y\x00'}]}]}, 0x20d4}, {&(0x7f0000006000)={0x1048, 0x15, 0x10, 0x70bd28, 0x25dfdbfb, "", [@typed={0x4, 0x48}, @nested={0x101c, 0x77, 0x0, 0x1, [@typed={0x5, 0x5b, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x35, 0x0, 0x0, @pid}, @typed={0x8, 0x5a, 0x0, 0x0, @uid=r3}, @generic="41a43f07eb6982a9589a137d571c99fd5cc59fdca9b8208f4be5e0bf9baaea4145431ac547b9eef286f54191f814b6bbfbc6c9f6ed54a1455551ade0c59290e16dcd35c07c52f3621a2329fd11947602a9c4d23b78c7a063cb33561cc7b2adc9559134d78b3361e1e28b155798222520b486d809c0cec3d1ed13552bb529ca2973b030031d738c79a561bb4ff1f39bc9b6f3e1d17a41254636952d1436d09deaa004213f75398f7882c8788994f32835b916debfcda10c986fa6316cadbe785dcf502c156d909e1af95030f368b7673717c8a6ec2f4f43daaa5c5f7ca3b01bd4cc211b6f0f97d281dce607d1662b0311508306892c8d9288e358483b7ecd2b2e838a692fc720fd2a6802f3732d30d616a2f6a38dbb004c242b85f738a06ebc5fef5f5696109ab2197ad4895ef669793d12903053257b183e932e50bc86a4ec49f060f1cd7ec28bf8cfdb140b16e57c514a7d1cefe0e1696ffcae47254afbed661741568d3717f81497518514d55466689142362c6578e9977c749d458463d270c77f0380f1e02aa9c13d28a7021673ef5d09a3af821f4092cd184fb0708a9a1836b1ffd878137d66a6e85dde2031453f79a57e356b489e7e435e2906289b92fb815abc5249bc796a2791e255cc0955471aca82f5fb19d0e17a06ef2ea4a11fa9582400ba0125bdd57c3e7f57a064652984d3198d060ce8c840f20b75d8032f6153824aabfd34258ec71e15a4e7ffe1348b0f590468e71b291999f8d0ac59efd6d15b95b802083999bc61bc046ca8ad3798f8a08a672510b19c0b32a49eea4198ff383fc353ed28ef113b37f7ff32c384a67ed241dc82114328be94d5ebb662bdf589850858628ac2090f2c9e42e4f84a2bb71e004558a744fa781121bfbf95acacab087de6546a6f8dbe06955a3b1ece379175f1d493267ffa6e1dee3993f7e1bd93c91f0276825bb6f7166045e68c44dd09ed78a01877489afd052490cdfb9bd0ae7c0968cc29800959b6c1294dbc468259637c210d8d667d7dbc977f9633c9f74bcea068879376433556e0213f6bd59d3af57bfc266bf36aaa52b5273d4f052da6138fc696846a91b87b9f680038e9783141174c0acd9534f98ac3625f5db184b725c6940701157a498d61871490079e7847c50746e2e4f51cdd60b4877d7a58b467b02139a6ec98a3dc98cfa2fc911b05c16c50e6750b485a76b6c42b61460f0fae9a61d9ac7a451b32c106c2cc05b399174008a587b6470047cc0dff43e7a9824d2e9af872221883d7078a38fda83cdcff2ef8fe92fd9edd7b8c3946840f2f295ef4b4608cf65a0e7a33d3b5e4415fd982a9016ce57e09fe1c605b324ca4853396258f982d0f9a2011da79f6368cdd06dbe2815264a6f4a79f3b24fbbe84c686d9555d4bb64ea3a624bfadf28690d39bfa50c0a81a608f92e6c66bbc57a2879d136d8f7a8d12dcc78873e76d7cc9abacdb7fd76414c7c9babfa33afbfcb94434848ad3c674f526164e56ccb8a6777b07ad21e065e97c1c69773103a7bde82b9e3349ebc41b5f2374737dc519b0014e72416ebc0a01e6dea319b49cff04501465b1bea076743d2a5dfe5db5a55fec56681317817d03c6143decde1af6989d6149511a48423e43170305b474ba36dce04a0db453abaa0e2d4a2875f2ccd0fce07c9f531b21eea439d6d47abffdcb2a8e026a3b76c6a3b4b4eee466e93673dacbe4e1da0c8c2eef8d359c5e44547d785ca434dc7d37dc2787ab41d19a0fa3e238e583c137ecc2f164fb3cf97643caf5153c77aee883cab0bdc1945e53a5d443239cbbfdc64203d157a5f32bacf70134ab7415b38606c3280fe1ec1841e2084d7728b5444c01e51d217f7ce8f1f7427f13a7b0a598612df172e3aeceed00829ec249a715a873db2cb2734a99716e7c5b23201a2f7056b78609762a9bbb141edea8610108054074929f5a4382b5d5e97c82557dfec96d0ca836b52161bd1356e4a47c2ea71f83937d0fa19f73f2abfd3615a90f58602a27335ff564b93cf1358e9047fa2eeef99742b20ae3f818ee5dec02a1e8f039912d36feaf8c99a52044da393d9ccc142340e8d0e7b0ea28b63b2773e225ea80934275f0d502aa5e883b27faa9d2ced4ef59f4ab5eb3cb0997b7dfbf37137cc0c9e960cfdf877640fa52f91e74302c0f747925bf37f4681337e6331ca646bc69acc10ccf74054f5ef99c8768429aa54bb3155d4821bc660f786ee653520b3796b1a7dac5c0baa1e4b07b0905edfd0ef14eb0d19897a35cc173915539bd9a67bdc3d36abf9839b556c81104f8368ea9aafd69944d91e9120838ddca8a84e1d96d19083d4d5efe7d7db28f2db007e051c43d6232bf850bee19638ad2eb519d0e0d0900afe787d2a21ab09428d548f2fa1c7c894aa8d37329d3edf38301d2b6b739f0e076e5ccbf7ff81c3f7151b4608967adce5794fc0d423e050d9a434d551d4a17e95426bcc5cbe0c0539d71c4fc6d2cbed75979f58a766594641b71075e267a7efe863fd3d4a597da94985c5e8a2f9dae6e2236a45a47740c25e1fb89afa7f2b3282e14a49dde9f8711b118fe815248989b4f426cd34aa3db72f82b9c1f18dc28db9d0989f25775b25aa6cbd714422358a20cd502b931e4aea690457c9be592bbff6d922cf5f60195b6b5f1f4bb61a9c1942b10b2c4e6ad57fdbd780de914b06d2578763aa92bf4118555f240c82ddb523729bdca47f075c031a2d561ad78b2f12fd5166d53f9ee9c024d1c93674581e836b22331214311970cb749f0786251d40292c0d36e2e3df2cb9ce502dabbf7ae8380d1284e7454e198c1c7cfb229f77356050db55dca5595eab21671f574a1dd95f9f5c62fb876def76946811c5d9854f2374eddafc6689a23f4636c364d2012c1b19122ccec94f5c69639454fc4c0cbe56cd2c33dff68b8e75f1e9755c4cb339cf815c58ec594dbae84943de801e68a0e8c25441631d2de036ca2fd6bf408351c87fcbc55fcef2d9219dedf54d40c0db972ec5d78fa2b37a8c40476a9ab5a0ce1bfa48695092ee8c9d35b38b1250d6bce649f150222e049de66ff13b235c8c6cb6e9a32a0b8a363f7d9a7fd775fde832cfcea786b2ba0f0c93690d26f9ec762c2c76cb9c9146c80f13b0bb7fa25095553f54b5de7770c229b04edd8992260ba695023aae577661bbc5520c6dc47d500ecd1dfd0a6cc27e30e49c8a720776659a6158a19a4772ee068d604b480027da18d7d80c8684a680b07cdb2387b39da219e9b0ac10682b35c1e24c71a23703d0089a77d50a2c409d367184a99ceb6718f237968e0057c0575532aad73b5a0dcb488c2b5db906f86e878204991aa15c0bde48781afbb7bc536fa75740124e67206bb5b5bd062edd683c5ee78690ff2837a2ff01646a4ed065118a34eb41d9b5e833bf56342643490409ae1d2dd8af9bda9ba10d0725fa5fe524209031e2b8f5da463d4f88d8a156bfe0ac3b1bb409bb8818f01fea4a94fd946810eb32bb80259c6d054f461b0caa92335e330c618a4e69d8163a80f4494ce0adf1412d6ed4a8f8633df8acdd5da88ec71af95e9f4b79a0c2aa99b26c01b8c5886e4ab7520d369952ebc82de129213302d84696cf902ebb354b0aea20c7ae274c250bd2a9bcd0edcb45f6e78f044747ef80327a1d51b1ec1805bd0cbc5f6a5a1942fe7fdc3c52ac895302fc6ab5a12ef286a9ba2e8567d72ad7e88e593074e7d51bea166ef4269b3f5336530762316e82b5ee1ab4e44f834b74d7e27bdf6e39c19fe34c82dcfbd68e602b354460ca6edb0373ba478e9cffa7c51baf208f90f3fc52e1ebadf7184cb35df55e6a3328402bfe5076f1233c47a2b60914d897942fd18e9a305904ca872f37b5f779ed487820b86845dd7120e3a8675db896bdeb373f7911be1eb260fb4022079aa3224deac71df27c50cb5105af4cd112a86793e7fc618ad0d48d23bc60914210652610c558f16b61b14e7362b5c9b764bf27e13056c383b639103573fa99f0d9619199d7d79b029574cfb88772dd80953f0576031d419ca03e9aa1c0a925f2b7698ecdab4eb5dd60874291fd0dd2049d33dda3a7ac52d1e1ba565f80bef2e46f12ffc12554b04f71da0c964084efff56cb32980340df278051b8c4481db359d20ebc6c94bb56498037f9f5fe0e24fe2b9d04b82f9185daaf144559d57bd312c4b628fe187600ec0c9cf9f2f6853b78f106269697e7734e62b55853a80d58630f33b60fc07ec9152b2f813c6d8630ac20364a526a0255a3aa2f935964930e9b740bdfc1f4d54c96ea6dba9cfc9c5d293d950317721b674fe5254695a742fec5b9b40f178494377d4eda80154cac807b8ca562ca88d6443426f1d6eae068051fd27169ca248e99dff540877a1d8a352af512ae7247d918c8716a1dc81bb56b7a5df2e7844d1e06902bebb83b746b42d86ec922445619896d3f6dcddbf4e8d60fe5b66510a68ff2f99181e90194cbc9dd0536c1171d5a6082e92eaaea61967bc78e5b028a8793834944e213a4dc5dcab01621791685e7a9d615bc8a967f51111168e13e33baa64b3009248c1c74ad54616c052b00c33450174af0c3953249cb8e80534795294dc59df356f4dbaf2cd54adeee91efd150620597f82b57baddb165e080f0a92d6d761feb38bc830129aeadbc039cc3be47c73844d175f7405a91ab9360bd4333606bde3118618e385d4c03ae41583ee9032e67d653951734746277f579fddaeb413e9a019822ba8347c5cda6805c90f99d9057fea7a172ca3f91cfde1760994955db95193ccb137758968e22c596cf80aea8d774b90f64ac05bd633d84d9f7ad5774fb1e7de12091cea03acf1da795677a13b932a1b75d0c3ebc934e96d0a8feb85cf5f7b8d7326d3f17110683d11597d9202387df93e44df250822994ff14553bb51a5d585e87945155ae454684e5d01d883cfa5f840cdb6781c3845bd650558373c1e14787141a12391249b2fb4ae5f87555efbc1b3cf95276a7499b5b269b27a9f23d81ee1965dfdbecf2f539104ab3481524208291fed43c6353d4f1b549bf23c3d54ec47c8c7bc382a1ca07452aa6aece83897c098b90c05b47545118bda2284987678002ad651092be3fcc57dd30e4e8c994f1874d91d339c97642417646347ab5a944ae1f1758cf64d13ed2a4a0a5b0ca5fc26256662e504231dd1b53b82bf7a204ce4c112c814a08a04f62cdf18babece558c19896de72bc28d7cc14014a08f9ba2bd4e73159a1b5ed1918720770ce500570f2f7d8b97503fe081e33ae794c0f400b085f90dacf4b4be9453dee98f4881b2453707a514b64ba573b75d30719ced36128d8954486fa4572e3aac6066cf09c31f8aa85e9c77d5c4d82de6941ba380350f79ac4028cd8b2a1d10e44fdbfbec8185d7a76f144ce3128f3c695e34149a04d074f534598788ee5c4f9a9d67ec4a8d3f6b6480a53d5e95f2092f034a22578651b2660dbaf39d93422791fb7b031a2bf4ae05edaf113aee8f9c55350c0118617f2a0fc3f9f4d664a00993d7e794c3ba084f8b0c2fc3022146243108ee6d92bedfacf9279cca19a60c62e8220024b471c02c083a476b4067b2aa40c8b8d340f9fec195e64750308c9d169b45948b0ab3cf604890127c91686527e5dac89fb2b28f85b9e66ec3aaabd98ccdc85edf51eb4b71e0cf418442543969ca2d9b762694bc62210a510591c5fcea5898c39cb76306d579538832ddaee619c07bc0e15c7ce9f27c196f04b5e61d55bfe9cd999dbe7aef9fb462c21c7d7071cc35f5"]}, @nested={0x18, 0x34, 0x0, 0x1, [@generic="ec2ed90cdbd186ec116c9f44edf4b487d6bb7c65"]}]}, 0x1048}, {&(0x7f0000007080)={0x114, 0x2c, 0x2, 0x70bd27, 0x25dfdbfe, "", [@nested={0x4, 0x74}, @nested={0xfd, 0x87, 0x0, 0x1, [@typed={0xe, 0x42, 0x0, 0x0, @binary="82d00cc3364b637774f1"}, @typed={0x8, 0x16, 0x0, 0x0, @fd=r1}, @generic="b59c977e11652b6706e586b98e555223586ed7dfc982dfb555a3017ae2f1ee1f5495c1d6d5865f8f7f93b03140e66e9bd8d8f5e79eeb91e17c61140e8c437e2c36ac5e39f46fcb893980188285eb69ccb2ae46cf093614930d863cfff9285f3f75b27aea146fe7036e360791cc61c0396bac677e146aaee536ca583c54aac19a4e4373fc4ba91780b1d04e5b5b7d7663c60c027001b99f0d27e9cdc1", @generic="101e685bda358110f77228a015eda5c540844677402b6d7a0544412a", @generic="e37cf3850227039e0c7ec661e1447c2c0ad6a8d36ac1c010a1f1f4085c9904ea2253dbb576a1c75d82"]}]}, 0x114}, {&(0x7f00000071c0)={0x22c, 0x30, 0x800, 0x70bd26, 0x25dfdbff, "", [@generic="0070d5a29163a1852e22a01af6a23abbc6906db4a2837e9bd8be5944565f36d96177b5a928a320cd05988881d6a3c4b81fae792d7b85d11d84680438edde49370fb0f7f0ec63b598815fb0333ce3c1e13b582b63ca74432c175966a031242281938532120ed5fa0afd90014f69961be1596b1373c8f0654decd81459bfc397209a33fcace5bf24423dcfec6bb91b9a7bf6d2a30b20282d0dc2064a64091242668523408016f3e1ae63685ebfdd8ce81bd5cf02422976c390af302261239a0013b346c6a1f6e224b78ac5bb8aee372d17392daddfd273c06c1628c4d361851d48c7de", @nested={0x3b, 0x40, 0x0, 0x1, [@typed={0x9, 0x19, 0x0, 0x0, @binary="def5f26ea9"}, @typed={0x14, 0x2e, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}, @generic="65420d876c0d30731143159bae3510", @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@multicast2}]}, @generic="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"]}, 0x22c}, {&(0x7f0000007400)={0xe0, 0x29, 0x10, 0x70bd26, 0x25dfdbfe, "", [@typed={0xc, 0x45, 0x0, 0x0, @u64=0x4000000000000000}, @generic="411e07503e2bcb083b651b7a0c007c272bce2ac79db16819def624a7d2e70a41f583711ddb5c6b3db6a76f040be1d45b0a4c960edc7b78633c9509aeb3d87992c369cafd921091aa76cb7c0dc7a5c1c0f6708b2d9bdb861e9ad56311c777209009d15f53dee1af10b7d51cc29c7188ba21c5d409ad1d3f4d0e0088f5b8895b38bbb19d1ae2a5c8701a3fffff94cbc711640509472f9f4067dd3ca181d53f86d29d4a1d25", @typed={0x1d, 0x6c, 0x0, 0x0, @binary="dc92fafebef0a9e7bf3498589cc49eceebfdad663bbbf83ab7"}]}, 0xe0}, {&(0x7f0000007540)={0x15c, 0x38, 0x800, 0x70bd28, 0x25dfdbfb, "", [@nested={0x9d, 0x46, 0x0, 0x1, [@typed={0x14, 0x76, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x11}}, @generic="772ef8a4d33bcd5439f87681fc9d76e757c7daaba1026519d3be57897c2ebe0e7a98afeed4f2e36d207bd2bafc67220897d078d5da28401a5458a6feea66f516960c1d0a4107a067b9fe1b13392767479e40", @generic="38a69f7def2b6d8f40287d558f3757165f69a172a9efe7ff8ae8ed7a08ce2260269873fbd225151feafa8f", @typed={0x8, 0x5b, 0x0, 0x0, @uid=0xee00}]}, @nested={0xac, 0xe, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r4}, @typed={0xc, 0x11, 0x0, 0x0, @u64=0x9}, @generic="8f473684764409c90f15df3edd7f682009600e4a5ec08dcc0c426c3db04b062da68951154fc95d1f00ad97fd18bdbf66639ae742c2e3f33e5a67f008301bed803fb9446127e1f3b723e0b156ea716fe28a6535464b03311d6b123b903b34b8996d7a64ac6e23c8e1bc5360b0472dacef4d3235e1", @typed={0xe, 0x52, 0x0, 0x0, @str='/dev/rtc0\x00'}, @typed={0x8, 0x5e, 0x0, 0x0, @uid=0xee01}, @typed={0x8, 0x2f, 0x0, 0x0, @fd=r1}]}]}, 0x15c}], 0x9, &(0x7f00000078c0)=[@rights={{0x28, 0x1, 0x1, [r5, r0, r2, r0, r7, r2]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, 0xffffffffffffffff}}}], 0x48, 0x4000}, 0x4) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2330.509755] ? loop_set_status_old+0x1b0/0x1b0 [ 2330.509773] blkdev_ioctl+0x356/0x7f0 [ 2330.509785] ? blkdev_common_ioctl+0x1990/0x1990 [ 2330.509797] ? selinux_file_ioctl+0xb1/0x260 [ 2330.509815] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2330.509834] ? blkdev_common_ioctl+0x1990/0x1990 [ 2330.509848] __x64_sys_ioctl+0x196/0x210 [ 2330.509868] do_syscall_64+0x3b/0x90 [ 2330.509882] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2330.509899] RIP: 0033:0x7f1d2141e8d7 [ 2330.509909] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.509922] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2330.509933] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7 [ 2330.509942] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2330.509949] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2330.509957] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008 21:25:14 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 97) 21:25:14 executing program 5: syz_read_part_table(0xfffffffd, 0x0, 0x0) 21:25:14 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5386, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:14 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x4b49, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2330.509964] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2330.509984] [ 2330.527824] loop2: detected capacity change from 0 to 215922 [ 2330.547535] loop6: detected capacity change from 0 to 215922 [ 2330.557077] FAULT_INJECTION: forcing a failure. [ 2330.557077] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2330.557096] CPU: 1 PID: 9909 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2330.557110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2330.557118] Call Trace: [ 2330.557122] [ 2330.557127] dump_stack_lvl+0x8b/0xb3 [ 2330.557148] should_fail.cold+0x5/0xa [ 2330.557162] strncpy_from_user+0x34/0x3d0 [ 2330.557185] getname_flags.part.0+0x95/0x4f0 [ 2330.557203] ? kmem_cache_free+0xe0/0x420 [ 2330.557226] getname_flags+0x9a/0xe0 [ 2330.557243] vfs_fstatat+0x73/0xb0 [ 2330.557264] __do_sys_newstat+0x88/0x110 [ 2330.557282] ? __ia32_sys_stat+0x70/0x70 [ 2330.557299] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2330.557319] ? xfd_validate_state+0x59/0x180 [ 2330.557338] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 2330.557362] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2330.557382] ? lockdep_hardirqs_on+0x79/0x100 [ 2330.557401] do_syscall_64+0x3b/0x90 [ 2330.557415] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2330.557433] RIP: 0033:0x7f5b6be25b16 [ 2330.557443] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2330.557454] RSP: 002b:00007f5b69359ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2330.557466] RAX: ffffffffffffffda RBX: 00007f5b69359f40 RCX: 00007f5b6be25b16 [ 2330.557474] RDX: 00007f5b69359fc0 RSI: 00007f5b69359fc0 RDI: 00007f5b69359f40 [ 2330.557482] RBP: 00007f5b6935a6bc R08: 0000000000000001 R09: 00007f5b69359d90 [ 2330.557489] R10: 00007f5b69359c47 R11: 0000000000000246 R12: 0000000000000007 [ 2330.557496] R13: 00007f5b69359fc0 R14: 0000000000000000 R15: 00007f5b69359f80 [ 2330.557516] [ 2330.590978] loop7: detected capacity change from 0 to 215922 [ 2330.600290] FAULT_INJECTION: forcing a failure. [ 2330.600290] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.600308] CPU: 0 PID: 9916 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2330.600322] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2330.600331] Call Trace: [ 2330.600335] [ 2330.600340] dump_stack_lvl+0x8b/0xb3 [ 2330.600361] should_fail.cold+0x5/0xa [ 2330.600374] ? create_object.isra.0+0x3a/0xa20 [ 2330.600398] should_failslab+0x5/0x10 [ 2330.600416] kmem_cache_alloc+0x5b/0x480 [ 2330.600440] create_object.isra.0+0x3a/0xa20 [ 2330.600455] ? kasan_unpoison+0x23/0x50 [ 2330.600473] __kmalloc+0x25b/0x440 [ 2330.600494] kobject_get_path+0xc0/0x1d0 [ 2330.600513] kobject_uevent_env+0x25c/0xfa0 [ 2330.600530] ? kernfs_put+0x42/0x50 [ 2330.600556] __loop_clr_fd+0x2f8/0x8b0 [ 2330.600576] lo_ioctl+0x632/0x1990 [ 2330.600591] ? vfs_fstatat+0x97/0xb0 [ 2330.600612] ? loop_set_status_old+0x1b0/0x1b0 [ 2330.600627] ? avc_ss_reset+0x180/0x180 [ 2330.600657] ? __lock_acquire+0xbac/0x6120 [ 2330.600684] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2330.600702] ? lock_is_held_type+0xd7/0x130 [ 2330.600719] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2330.600739] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2330.600758] ? do_vfs_ioctl+0x132/0x1610 [ 2330.600777] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2330.600797] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2330.600810] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2330.600828] ? blkdev_bszset+0x1f0/0x1f0 [ 2330.600841] ? selinux_inode_getsecctx+0x90/0x90 [ 2330.600860] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2330.600880] ? __ia32_sys_stat+0x70/0x70 [ 2330.600901] ? loop_set_status_old+0x1b0/0x1b0 [ 2330.600918] blkdev_ioctl+0x356/0x7f0 [ 2330.600930] ? blkdev_common_ioctl+0x1990/0x1990 [ 2330.600942] ? selinux_file_ioctl+0xb1/0x260 [ 2330.600960] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2330.600978] ? blkdev_common_ioctl+0x1990/0x1990 [ 2330.600992] __x64_sys_ioctl+0x196/0x210 [ 2330.601013] do_syscall_64+0x3b/0x90 [ 2330.601027] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2330.601044] RIP: 0033:0x7f1d2141e8d7 [ 2330.601055] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.601069] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2330.601083] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7 [ 2330.601091] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2330.601098] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2330.601106] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008 [ 2330.601113] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2330.601133] [ 2330.659946] loop5: detected capacity change from 0 to 264192 [ 2330.693082] loop4: detected capacity change from 0 to 215922 [ 2330.734414] loop2: detected capacity change from 0 to 215922 [ 2330.745505] loop2: detected capacity change from 0 to 215922 21:25:31 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 98) 21:25:31 executing program 5: syz_read_part_table(0xfffffffe, 0x0, 0x0) 21:25:31 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:25:31 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5382, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:31 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 93) 21:25:31 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'}) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x40010, r3, 0x3) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:31 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x541b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:31 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfeffffffffffffff, 0x0) [ 2347.941538] 9pnet_fd: p9_fd_create_tcp (9939): problem connecting socket to 127.0.0.1 [ 2347.946485] loop2: detected capacity change from 0 to 215922 [ 2347.950893] loop5: detected capacity change from 0 to 264192 [ 2347.951334] loop4: detected capacity change from 0 to 215922 [ 2347.971391] loop7: detected capacity change from 0 to 215922 21:25:31 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xffffffff00000000, 0x0) [ 2347.986377] loop6: detected capacity change from 0 to 215922 [ 2348.007966] FAULT_INJECTION: forcing a failure. [ 2348.007966] name failslab, interval 1, probability 0, space 0, times 0 [ 2348.007990] CPU: 1 PID: 9947 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2348.008006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2348.008016] Call Trace: [ 2348.008021] [ 2348.008027] dump_stack_lvl+0x8b/0xb3 [ 2348.008050] should_fail.cold+0x5/0xa [ 2348.008066] ? create_object.isra.0+0x3a/0xa20 [ 2348.008090] should_failslab+0x5/0x10 [ 2348.008111] kmem_cache_alloc+0x5b/0x480 [ 2348.008140] create_object.isra.0+0x3a/0xa20 [ 2348.008159] ? kasan_unpoison+0x23/0x50 [ 2348.008181] __kmalloc_node_track_caller+0x269/0x440 [ 2348.008205] ? alloc_uevent_skb+0x7b/0x210 [ 2348.008230] __alloc_skb+0xe3/0x340 [ 2348.008253] alloc_uevent_skb+0x7b/0x210 [ 2348.008277] kobject_uevent_env+0xaa4/0xfa0 21:25:31 executing program 5: syz_read_part_table(0x1000000000, 0x0, 0x0) [ 2348.008300] ? kernfs_put+0x42/0x50 [ 2348.008330] __loop_clr_fd+0x2f8/0x8b0 [ 2348.008361] lo_ioctl+0x632/0x1990 [ 2348.008384] ? vfs_fstatat+0x97/0xb0 [ 2348.008414] ? loop_set_status_old+0x1b0/0x1b0 21:25:31 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfffffffffffff000, 0x0) [ 2348.008436] ? avc_ss_reset+0x180/0x180 21:25:31 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 94) [ 2348.008478] ? __lock_acquire+0xbac/0x6120 [ 2348.008517] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2348.008543] ? lock_is_held_type+0xd7/0x130 [ 2348.008566] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2348.008595] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2348.008623] ? do_vfs_ioctl+0x132/0x1610 [ 2348.008649] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2348.008677] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2348.008695] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2348.008720] ? blkdev_bszset+0x1f0/0x1f0 [ 2348.008737] ? selinux_inode_getsecctx+0x90/0x90 [ 2348.008764] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2348.008791] ? __ia32_sys_stat+0x70/0x70 [ 2348.008819] ? loop_set_status_old+0x1b0/0x1b0 [ 2348.008845] blkdev_ioctl+0x356/0x7f0 [ 2348.008862] ? blkdev_common_ioctl+0x1990/0x1990 [ 2348.008878] ? selinux_file_ioctl+0xb1/0x260 [ 2348.008905] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2348.008934] ? blkdev_common_ioctl+0x1990/0x1990 [ 2348.008958] __x64_sys_ioctl+0x196/0x210 [ 2348.008988] do_syscall_64+0x3b/0x90 [ 2348.009009] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2348.009033] RIP: 0033:0x7f1d2141e8d7 [ 2348.009047] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2348.009062] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:25:31 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) write$binfmt_aout(r1, &(0x7f00000003c0)={{0xcc, 0x4, 0x5, 0x2f0, 0x376, 0x6, 0x88, 0x3}, "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x820) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:31 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5385, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:31 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5421, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:31 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 99) [ 2348.009079] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7 [ 2348.009091] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2348.009102] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2348.009112] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008 [ 2348.009122] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2348.009155] [ 2348.020270] loop5: detected capacity change from 0 to 264192 [ 2348.020852] FAULT_INJECTION: forcing a failure. [ 2348.020852] name failslab, interval 1, probability 0, space 0, times 0 [ 2348.020881] CPU: 1 PID: 9938 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2348.020905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2348.020919] Call Trace: [ 2348.020925] [ 2348.020934] dump_stack_lvl+0x8b/0xb3 [ 2348.020966] should_fail.cold+0x5/0xa [ 2348.020989] ? kobject_get_path+0xc0/0x1d0 [ 2348.021016] should_failslab+0x5/0x10 [ 2348.021046] __kmalloc+0x72/0x440 [ 2348.021085] kobject_get_path+0xc0/0x1d0 [ 2348.021108] kobject_uevent_env+0x25c/0xfa0 [ 2348.021134] ? kernfs_put+0x42/0x50 [ 2348.021166] __loop_clr_fd+0x2f8/0x8b0 [ 2348.021193] lo_ioctl+0x632/0x1990 [ 2348.021220] ? vfs_fstatat+0x97/0xb0 [ 2348.021250] ? loop_set_status_old+0x1b0/0x1b0 [ 2348.021274] ? avc_ss_reset+0x180/0x180 [ 2348.021318] ? __lock_acquire+0xbac/0x6120 [ 2348.021355] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2348.021382] ? lock_is_held_type+0xd7/0x130 [ 2348.021404] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2348.021433] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 21:25:32 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfffffffffffffffe, 0x0) 21:25:32 executing program 5: syz_read_part_table(0x8000000000000, 0x0, 0x0) [ 2348.021462] ? do_vfs_ioctl+0x132/0x1610 [ 2348.021492] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2348.021522] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2348.021541] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2348.021566] ? blkdev_bszset+0x1f0/0x1f0 [ 2348.021583] ? selinux_inode_getsecctx+0x90/0x90 [ 2348.021612] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2348.021640] ? __ia32_sys_stat+0x70/0x70 [ 2348.021669] ? loop_set_status_old+0x1b0/0x1b0 [ 2348.021697] blkdev_ioctl+0x356/0x7f0 [ 2348.021715] ? blkdev_common_ioctl+0x1990/0x1990 [ 2348.021732] ? selinux_file_ioctl+0xb1/0x260 [ 2348.021761] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2348.021788] ? blkdev_common_ioctl+0x1990/0x1990 [ 2348.021809] __x64_sys_ioctl+0x196/0x210 [ 2348.021837] do_syscall_64+0x3b/0x90 [ 2348.021862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2348.021893] RIP: 0033:0x7f5b6be268d7 [ 2348.021911] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2348.021932] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2348.021954] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7 [ 2348.021970] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000a [ 2348.021983] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2348.022017] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008 [ 2348.022026] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2348.022056] [ 2348.040207] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2348.040239] Buffer I/O error on dev loop5, logical block 0, async page read [ 2348.040297] loop5: unable to read partition table [ 2348.040394] loop5: partition table beyond EOD, truncated [ 2348.063053] loop2: detected capacity change from 0 to 215922 [ 2348.080542] loop4: detected capacity change from 0 to 215922 [ 2348.258679] loop5: detected capacity change from 0 to 264192 [ 2348.277803] loop4: detected capacity change from 0 to 215922 [ 2348.326912] loop6: detected capacity change from 0 to 215922 [ 2348.346526] loop2: detected capacity change from 0 to 215922 [ 2348.373238] FAULT_INJECTION: forcing a failure. [ 2348.373238] name failslab, interval 1, probability 0, space 0, times 0 [ 2348.373264] CPU: 1 PID: 9971 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2348.373284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2348.373296] Call Trace: [ 2348.373302] [ 2348.373308] dump_stack_lvl+0x8b/0xb3 [ 2348.373335] should_fail.cold+0x5/0xa [ 2348.373355] ? __alloc_skb+0x211/0x340 [ 2348.373378] should_failslab+0x5/0x10 [ 2348.373403] kmem_cache_alloc_node+0x55/0x490 [ 2348.373442] __alloc_skb+0x211/0x340 [ 2348.373467] alloc_uevent_skb+0x7b/0x210 [ 2348.373495] kobject_uevent_env+0xaa4/0xfa0 [ 2348.373525] ? kernfs_put+0x42/0x50 [ 2348.373568] __loop_clr_fd+0x2f8/0x8b0 [ 2348.373600] lo_ioctl+0x632/0x1990 [ 2348.373627] ? vfs_fstatat+0x97/0xb0 [ 2348.373667] ? loop_set_status_old+0x1b0/0x1b0 [ 2348.373691] ? avc_ss_reset+0x180/0x180 [ 2348.373742] ? __lock_acquire+0xbac/0x6120 [ 2348.373788] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2348.373821] ? lock_is_held_type+0xd7/0x130 [ 2348.373847] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2348.373876] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2348.373907] ? do_vfs_ioctl+0x132/0x1610 [ 2348.373939] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2348.373971] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2348.373990] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2348.374034] ? blkdev_bszset+0x1f0/0x1f0 [ 2348.374053] ? selinux_inode_getsecctx+0x90/0x90 [ 2348.374083] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2348.374112] ? __ia32_sys_stat+0x70/0x70 [ 2348.374144] ? loop_set_status_old+0x1b0/0x1b0 [ 2348.374175] blkdev_ioctl+0x356/0x7f0 [ 2348.374195] ? blkdev_common_ioctl+0x1990/0x1990 [ 2348.374214] ? selinux_file_ioctl+0xb1/0x260 [ 2348.374246] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2348.374277] ? blkdev_common_ioctl+0x1990/0x1990 [ 2348.374301] __x64_sys_ioctl+0x196/0x210 [ 2348.374336] do_syscall_64+0x3b/0x90 [ 2348.374360] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2348.374387] RIP: 0033:0x7f5b6be268d7 [ 2348.374401] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2348.374419] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2348.374438] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7 [ 2348.374451] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000b [ 2348.374463] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2348.374475] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008 [ 2348.374486] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2348.374520] [ 2348.434163] loop2: detected capacity change from 0 to 215922 [ 2348.478218] loop7: detected capacity change from 0 to 215922 [ 2348.495486] FAULT_INJECTION: forcing a failure. [ 2348.495486] name failslab, interval 1, probability 0, space 0, times 0 [ 2348.495512] CPU: 0 PID: 9979 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2348.495530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2348.495541] Call Trace: [ 2348.495546] [ 2348.495558] dump_stack_lvl+0x8b/0xb3 [ 2348.495583] should_fail.cold+0x5/0xa [ 2348.495601] ? skb_clone+0x170/0x3c0 [ 2348.495625] should_failslab+0x5/0x10 [ 2348.495651] kmem_cache_alloc+0x5b/0x480 [ 2348.495684] skb_clone+0x170/0x3c0 [ 2348.495710] netlink_broadcast+0x9b1/0xd70 [ 2348.495746] ? alloc_uevent_skb+0x1c2/0x210 [ 2348.495771] kobject_uevent_env+0xa6b/0xfa0 [ 2348.495798] ? kernfs_put+0x42/0x50 [ 2348.495832] __loop_clr_fd+0x2f8/0x8b0 [ 2348.495859] lo_ioctl+0x632/0x1990 [ 2348.495883] ? vfs_fstatat+0x97/0xb0 [ 2348.495913] ? loop_set_status_old+0x1b0/0x1b0 [ 2348.495935] ? avc_ss_reset+0x180/0x180 [ 2348.495982] ? __lock_acquire+0xbac/0x6120 [ 2348.496023] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2348.496050] ? lock_is_held_type+0xd7/0x130 [ 2348.496073] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2348.496107] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2348.496132] ? do_vfs_ioctl+0x132/0x1610 [ 2348.496158] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2348.496187] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2348.496205] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2348.496231] ? blkdev_bszset+0x1f0/0x1f0 [ 2348.496250] ? selinux_inode_getsecctx+0x90/0x90 [ 2348.496280] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2348.496310] ? __ia32_sys_stat+0x70/0x70 [ 2348.496340] ? loop_set_status_old+0x1b0/0x1b0 [ 2348.496367] blkdev_ioctl+0x356/0x7f0 [ 2348.496384] ? blkdev_common_ioctl+0x1990/0x1990 [ 2348.496403] ? selinux_file_ioctl+0xb1/0x260 [ 2348.496429] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2348.496453] ? blkdev_common_ioctl+0x1990/0x1990 [ 2348.496471] __x64_sys_ioctl+0x196/0x210 [ 2348.496498] do_syscall_64+0x3b/0x90 [ 2348.496517] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2348.496541] RIP: 0033:0x7f1d2141e8d7 [ 2348.496555] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2348.496571] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2348.496589] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7 [ 2348.496601] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2348.496612] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 [ 2348.496622] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008 [ 2348.496634] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2348.496667] 21:25:49 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:25:49 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x60, 0x0, 0x6, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) 21:25:49 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xffffffffffffffff, 0x0) 21:25:49 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5386, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:49 executing program 5: syz_read_part_table(0x40000000000000, 0x0, 0x0) 21:25:49 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 100) 21:25:49 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5450, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:25:49 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 95) [ 2365.792272] loop2: detected capacity change from 0 to 215922 [ 2365.794414] loop7: detected capacity change from 0 to 215922 [ 2365.799666] 9pnet_fd: p9_fd_create_tcp (10000): problem connecting socket to 127.0.0.1 [ 2365.804819] loop4: detected capacity change from 0 to 215922 [ 2365.819115] loop6: detected capacity change from 0 to 215922 [ 2365.833650] loop5: detected capacity change from 0 to 264192 [ 2365.845834] FAULT_INJECTION: forcing a failure. [ 2365.845834] name failslab, interval 1, probability 0, space 0, times 0 [ 2365.845861] CPU: 1 PID: 9997 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2365.845881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2365.845893] Call Trace: [ 2365.845898] [ 2365.845905] dump_stack_lvl+0x8b/0xb3 [ 2365.845930] should_fail.cold+0x5/0xa [ 2365.845948] ? kobject_uevent_env+0x236/0xfa0 [ 2365.845970] should_failslab+0x5/0x10 [ 2365.845993] kmem_cache_alloc_trace+0x55/0x3c0 [ 2365.846026] kobject_uevent_env+0x236/0xfa0 [ 2365.846047] ? dev_uevent_filter+0xd0/0xd0 [ 2365.846074] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2365.846096] disk_event_uevent+0x17b/0x1e0 [ 2365.846125] ? disk_events_async_show+0x10/0x10 [ 2365.846164] disk_force_media_change+0x1e/0xc0 [ 2365.846189] __loop_clr_fd+0x5d9/0x8b0 [ 2365.846215] lo_ioctl+0x632/0x1990 [ 2365.846238] ? vfs_fstatat+0x97/0xb0 [ 2365.846315] ? loop_set_status_old+0x1b0/0x1b0 [ 2365.846337] ? avc_ss_reset+0x180/0x180 [ 2365.846383] ? __lock_acquire+0xbac/0x6120 [ 2365.846421] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2365.846449] ? lock_is_held_type+0xd7/0x130 [ 2365.846471] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2365.846499] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 21:25:49 executing program 7: syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2365.846527] ? do_vfs_ioctl+0x132/0x1610 [ 2365.846557] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2365.846589] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2365.846609] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2365.846637] ? blkdev_bszset+0x1f0/0x1f0 21:25:49 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 96) 21:25:49 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0xffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/146, 0x92}, {&(0x7f0000000580)=""/139, 0x8b}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000000640)=""/235, 0xeb}], 0x4, &(0x7f0000000780)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xc0}, 0x40002042) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0xfa, 0x70, 0x6, 0x0, 0x81, 0x8c1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000400), 0x6}, 0x8404, 0x22a, 0x9, 0x3, 0x3, 0x8, 0x3, 0x0, 0x4, 0x0, 0x8}, r5, 0xd, r0, 0x1) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="02001e00"], 0x18}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'veth1\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2365.846655] ? selinux_inode_getsecctx+0x90/0x90 [ 2365.846683] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2365.846712] ? __ia32_sys_stat+0x70/0x70 [ 2365.846744] ? loop_set_status_old+0x1b0/0x1b0 [ 2365.846770] blkdev_ioctl+0x356/0x7f0 [ 2365.846787] ? blkdev_common_ioctl+0x1990/0x1990 [ 2365.846805] ? selinux_file_ioctl+0xb1/0x260 [ 2365.846831] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2365.846856] ? blkdev_common_ioctl+0x1990/0x1990 21:25:49 executing program 5: syz_read_part_table(0xf0ffffffffffff, 0x0, 0x0) 21:25:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000003c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback}, 0xc) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'geneve1\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) flock(r4, 0x0) 21:25:49 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5451, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2365.846880] __x64_sys_ioctl+0x196/0x210 [ 2365.846913] do_syscall_64+0x3b/0x90 [ 2365.846935] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2365.846961] RIP: 0033:0x7f1d2141e8d7 [ 2365.846976] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2365.846994] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2365.847012] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7 [ 2365.847025] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2365.847036] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90 21:25:49 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x541b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2365.847047] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008 [ 2365.847058] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80 [ 2365.847087] [ 2365.850214] FAULT_INJECTION: forcing a failure. [ 2365.850214] name failslab, interval 1, probability 0, space 0, times 0 [ 2365.850240] CPU: 1 PID: 10004 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2365.850279] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 21:25:49 executing program 5: syz_read_part_table(0x100000000000000, 0x0, 0x0) [ 2365.850290] Call Trace: [ 2365.850294] [ 2365.850301] dump_stack_lvl+0x8b/0xb3 [ 2365.850328] should_fail.cold+0x5/0xa [ 2365.850350] ? __alloc_skb+0x211/0x340 [ 2365.850374] should_failslab+0x5/0x10 [ 2365.850400] kmem_cache_alloc_node+0x55/0x490 [ 2365.850442] __alloc_skb+0x211/0x340 [ 2365.850471] alloc_uevent_skb+0x7b/0x210 [ 2365.850496] kobject_uevent_env+0xaa4/0xfa0 [ 2365.850521] ? kernfs_put+0x42/0x50 [ 2365.850565] __loop_clr_fd+0x2f8/0x8b0 [ 2365.850596] lo_ioctl+0x632/0x1990 [ 2365.850621] ? vfs_fstatat+0x97/0xb0 [ 2365.850652] ? loop_set_status_old+0x1b0/0x1b0 [ 2365.850673] ? avc_ss_reset+0x180/0x180 [ 2365.850717] ? __lock_acquire+0xbac/0x6120 [ 2365.850757] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2365.850786] ? lock_is_held_type+0xd7/0x130 [ 2365.850809] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2365.850838] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2365.850868] ? do_vfs_ioctl+0x132/0x1610 [ 2365.850898] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2365.850928] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2365.850947] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2365.850977] ? blkdev_bszset+0x1f0/0x1f0 [ 2365.850998] ? selinux_inode_getsecctx+0x90/0x90 [ 2365.851029] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2365.851061] ? __ia32_sys_stat+0x70/0x70 [ 2365.851092] ? loop_set_status_old+0x1b0/0x1b0 [ 2365.851119] blkdev_ioctl+0x356/0x7f0 [ 2365.851138] ? blkdev_common_ioctl+0x1990/0x1990 [ 2365.851158] ? selinux_file_ioctl+0xb1/0x260 [ 2365.851186] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2365.851215] ? blkdev_common_ioctl+0x1990/0x1990 [ 2365.851237] __x64_sys_ioctl+0x196/0x210 [ 2365.851270] do_syscall_64+0x3b/0x90 [ 2365.851292] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2365.851318] RIP: 0033:0x7f5b6be268d7 [ 2365.851333] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2365.851354] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2365.851372] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7 [ 2365.851386] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000a [ 2365.851399] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2365.851412] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008 [ 2365.851424] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2365.851458] [ 2365.865090] loop5: detected capacity change from 0 to 264192 [ 2365.886532] loop2: detected capacity change from 0 to 215922 [ 2366.052205] loop7: detected capacity change from 0 to 215922 [ 2366.056939] loop5: detected capacity change from 0 to 264192 [ 2366.061175] loop6: detected capacity change from 0 to 215922 [ 2366.067174] loop5: detected capacity change from 0 to 264192 [ 2366.083326] FAULT_INJECTION: forcing a failure. [ 2366.083326] name failslab, interval 1, probability 0, space 0, times 0 [ 2366.083349] CPU: 1 PID: 10014 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2366.083366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2366.083375] Call Trace: [ 2366.083380] [ 2366.083386] dump_stack_lvl+0x8b/0xb3 [ 2366.083407] should_fail.cold+0x5/0xa [ 2366.083426] ? __alloc_skb+0x211/0x340 [ 2366.083447] should_failslab+0x5/0x10 [ 2366.083470] kmem_cache_alloc_node+0x55/0x490 [ 2366.083504] __alloc_skb+0x211/0x340 [ 2366.083526] alloc_uevent_skb+0x7b/0x210 [ 2366.083554] kobject_uevent_env+0xaa4/0xfa0 [ 2366.083577] ? kernfs_put+0x42/0x50 [ 2366.083605] __loop_clr_fd+0x2f8/0x8b0 [ 2366.083633] lo_ioctl+0x632/0x1990 [ 2366.083657] ? vfs_fstatat+0x97/0xb0 [ 2366.083688] ? loop_set_status_old+0x1b0/0x1b0 [ 2366.083707] ? avc_ss_reset+0x180/0x180 [ 2366.083746] ? __lock_acquire+0xbac/0x6120 [ 2366.083781] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2366.083806] ? lock_is_held_type+0xd7/0x130 [ 2366.083830] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2366.083860] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2366.083886] ? do_vfs_ioctl+0x132/0x1610 [ 2366.083910] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2366.083936] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2366.083952] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2366.083976] ? blkdev_bszset+0x1f0/0x1f0 [ 2366.083993] ? selinux_inode_getsecctx+0x90/0x90 [ 2366.084024] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2366.084053] ? __ia32_sys_stat+0x70/0x70 [ 2366.084081] ? loop_set_status_old+0x1b0/0x1b0 [ 2366.084105] blkdev_ioctl+0x356/0x7f0 [ 2366.084121] ? blkdev_common_ioctl+0x1990/0x1990 [ 2366.084137] ? selinux_file_ioctl+0xb1/0x260 [ 2366.084164] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2366.084193] ? blkdev_common_ioctl+0x1990/0x1990 [ 2366.084215] __x64_sys_ioctl+0x196/0x210 [ 2366.084242] do_syscall_64+0x3b/0x90 [ 2366.084261] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2366.084282] RIP: 0033:0x7f5b6be268d7 [ 2366.084295] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2366.084309] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2366.084325] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7 [ 2366.084335] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000b [ 2366.084346] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2366.084358] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008 [ 2366.084368] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2366.084401] [ 2366.094927] loop4: detected capacity change from 0 to 215922 [ 2366.185170] loop5: detected capacity change from 0 to 264192 [ 2366.187798] loop2: detected capacity change from 0 to 215922 [ 2366.199959] loop5: detected capacity change from 0 to 264192 21:26:04 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5452, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:04 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440), 0xa1dc0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f0000000540)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x2, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x4}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0xec90f599dccb34ba}, 0x80) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x81, 0x0, 0x2, 0x1f, 0x0, 0x1, 0x12e, 0x6, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0xb, 0x7, 0x3, 0x3, 0x2, 0x1f, 0xfc00, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r4, 0x1) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:04 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) fstat(r0, &(0x7f00000003c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:04 executing program 5: syz_read_part_table(0x200000000000000, 0x0, 0x0) 21:26:04 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5421, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:04 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:26:04 executing program 7: syz_read_part_table(0x696e5b3, 0x2, 0x0) 21:26:04 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 97) [ 2380.698336] 9pnet_fd: p9_fd_create_tcp (10044): problem connecting socket to 127.0.0.1 [ 2380.725700] loop5: detected capacity change from 0 to 264192 [ 2380.789506] loop2: detected capacity change from 0 to 215922 [ 2380.820505] loop4: detected capacity change from 0 to 215922 [ 2380.873723] loop5: detected capacity change from 0 to 264192 21:26:04 executing program 7: syz_read_part_table(0x696e5b3, 0x3, 0x0) [ 2380.885532] loop2: detected capacity change from 0 to 215922 21:26:04 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10040041}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xb4, 0x0, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_RATE_PARENT_NODE_NAME={0xf, 0xa9, @name2}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x2}, @DEVLINK_ATTR_RATE_TX_SHARE={0xc, 0xa6, 0x8}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x8}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}]}, 0xb4}}, 0x8080) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:04 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5450, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:04 executing program 5: syz_read_part_table(0x300000000000000, 0x0, 0x0) [ 2381.139383] loop6: detected capacity change from 0 to 215922 21:26:04 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000000c0)={0x80000000}) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2381.203154] loop2: detected capacity change from 0 to 215922 [ 2381.245071] FAULT_INJECTION: forcing a failure. [ 2381.245071] name failslab, interval 1, probability 0, space 0, times 0 [ 2381.245117] CPU: 0 PID: 10055 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2381.245149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2381.245169] Call Trace: [ 2381.245177] [ 2381.245188] dump_stack_lvl+0x8b/0xb3 [ 2381.245232] should_fail.cold+0x5/0xa [ 2381.245268] ? create_object.isra.0+0x3a/0xa20 [ 2381.245324] should_failslab+0x5/0x10 [ 2381.245379] kmem_cache_alloc+0x5b/0x480 [ 2381.245452] create_object.isra.0+0x3a/0xa20 [ 2381.245501] ? kasan_unpoison+0x23/0x50 [ 2381.245558] kmem_cache_alloc_trace+0x22e/0x3c0 [ 2381.245631] kobject_uevent_env+0x236/0xfa0 [ 2381.245678] ? dev_uevent_filter+0xd0/0xd0 [ 2381.245729] ? kernfs_put+0x42/0x50 [ 2381.245800] __loop_clr_fd+0x2f8/0x8b0 [ 2381.245857] lo_ioctl+0x632/0x1990 [ 2381.245904] ? vfs_fstatat+0x97/0xb0 [ 2381.245971] ? loop_set_status_old+0x1b0/0x1b0 [ 2381.246015] ? avc_ss_reset+0x180/0x180 [ 2381.246109] ? __lock_acquire+0xbac/0x6120 [ 2381.246192] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2381.246248] ? lock_is_held_type+0xd7/0x130 [ 2381.246298] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2381.246356] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2381.246417] ? do_vfs_ioctl+0x132/0x1610 [ 2381.246477] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2381.246553] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2381.246597] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2381.246656] ? blkdev_bszset+0x1f0/0x1f0 [ 2381.246693] ? selinux_inode_getsecctx+0x90/0x90 [ 2381.246758] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 21:26:04 executing program 7: syz_read_part_table(0x696e5b3, 0x4, 0x0) 21:26:04 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5460, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:05 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x998, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x20000000001000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2381.246832] ? loop_set_status_old+0x1b0/0x1b0 [ 2381.246890] blkdev_ioctl+0x356/0x7f0 [ 2381.246928] ? blkdev_common_ioctl+0x1990/0x1990 [ 2381.246967] ? selinux_file_ioctl+0xb1/0x260 [ 2381.247025] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2381.247087] ? blkdev_common_ioctl+0x1990/0x1990 [ 2381.247135] __x64_sys_ioctl+0x196/0x210 21:26:05 executing program 5: syz_read_part_table(0x400000000000000, 0x0, 0x0) [ 2381.247203] do_syscall_64+0x3b/0x90 [ 2381.247248] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2381.247302] RIP: 0033:0x7f5b6be268d7 [ 2381.247331] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2381.247367] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2381.247403] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7 [ 2381.247430] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000b [ 2381.247453] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2381.247478] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008 [ 2381.247502] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2381.247567] [ 2381.266777] loop5: detected capacity change from 0 to 264192 [ 2381.460098] loop2: detected capacity change from 0 to 215922 [ 2381.475167] loop4: detected capacity change from 0 to 215922 [ 2381.674427] loop5: detected capacity change from 0 to 264192 [ 2381.688164] loop5: detected capacity change from 0 to 264192 21:26:22 executing program 5: syz_read_part_table(0x500000000000000, 0x0, 0x0) 21:26:22 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000440)="e308645ab9b9bb69c14e520ccc5c8250e97b3a0a16895ea218e7f9a55484b09c1377a43e0daf377311fa28d32558db8800c2b96221eb8045932e5ed21b387fad563d943c58863a28a81c6d5be5b71f649ecef590ff53dbced382c7ebd2ff02a5ca98ea8a0625e35001d2301c9740ca061c9375d19735955aec8b47082a990266016a8cca27a74595ea", 0x89}, {&(0x7f0000000500)="61cd786de10c4bee76bd8215898418833d71d6c733c394f1674a360547fe16e228466048ca304323abbf893e40d22a4b8658d017cc2e148e2e0536c053d19299c52e0a9c9093381a188d06bef23fb92205bdad0bcbe497126ccb8be3badbd7a5c9b751006a6ea88c444bd7ffffaae38e92d094fc8f4204a1730e42a083829a1d5679e398199761452546eba0178a2b2f23f5085ee41efd483b709bab24d5e160fdfbd742a77eb5c5474cb0d77db6d70e1d7564e147d791ab4224c932a72462c0115ce6ef9c55d075af8d520e013aeb660d90bead7b6708f5eb099fa7678e0eb5dfa71c4b07938445dc1548", 0xeb}], 0x2, &(0x7f0000000640)=[@rights={{0x24, 0x1, 0x1, [r4, r1, r3, r0, r7]}}], 0x28, 0x4040}}], 0x1, 0x40c0004) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) sendfile(r2, r8, &(0x7f00000000c0)=0xc5, 0x8) 21:26:22 executing program 7: syz_read_part_table(0x696e5b3, 0x5, 0x0) 21:26:22 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 98) 21:26:22 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x40049409, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:22 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:26:22 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5451, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2398.670768] loop5: detected capacity change from 0 to 264192 21:26:22 executing program 3: ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000400)={0x80, "e49ebde065edcbcd7c34ee453a3d3085a4b3b4686769e199680014e03db5088aec353c229f25af747683b7c237282622ef5863657f7cdb767ab75a7ddaed36b94040c9e4068e34512d6c2b47976c9fd0911d756b4b72468e00bc81a7b145638bfe9c03c3186d981df5070d9b48e31b8835c15c8f6a9ba4a35f50d79acbd84bdd72aadb1657fc5159aca010ee92e1061709e71a9ae2be24ea8aa2f9cf251dd1e6bfcad82e45412022947240c52780745e82848e63bb88fbc517c851b39a094b619fad419768649fa8c8f4d92fd70c76c7d3034d1e4de69e84971a229e0968e3de749f5a44dd6234d2ac3130bd44868a122b80ae00f5a05c7241f7fe78e01497cf944453ca53f40ca68a5cbf14c9af42d6028ea029c52d4c135f48e67b0b64eb6cab6c07f8ed8cae7b2fd3a4444652bec2841e0c200ee7f6d115e56ed16a8b7ff2f8666fc7db2360cd0916f560650fc3b60012a1bc47d31b7a6d93d2b2712ce502bbafc0de5120e075a0a70e304e1fa49ef0d126ffcf9d40e27c6cebb340369aa2dd8d44ae043271d6c887c39ccb2c851b23311d0776affa36587004230049ce048eff3074ef2a1db4310a06e17170239de096f709e7462817597125155b35e6befbd5e238e9e5322b71034bae60ed9aeb5d38e32a309b8e878e9dde33003a5478552dc434f657b2972616a6b53cc070a3d36e19c8692348ca6635db38f2c65314"}) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7}}, './file0\x00'}) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './file0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000640)={{0x1, 0x1, 0x18, r5, {0xfffff800, 0x6}}, './file0\x00'}) [ 2398.689167] loop2: detected capacity change from 0 to 215922 [ 2398.761155] loop5: detected capacity change from 0 to 264192 21:26:22 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18}, 0x0) r8 = open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x100) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x82002, 0x0) ppoll(&(0x7f0000000400)=[{r5, 0x2400}, {r6, 0x20}, {r8, 0x3001}, {r3, 0x1020}, {r9, 0xc001}, {r3, 0x8}, {r3, 0x2000}, {r2, 0x200}], 0x8, &(0x7f0000000440), &(0x7f0000000480)={[0xdd]}, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2398.776223] loop4: detected capacity change from 0 to 215922 [ 2398.777486] 9pnet_fd: p9_fd_create_tcp (10115): problem connecting socket to 127.0.0.1 [ 2398.784843] loop2: detected capacity change from 0 to 215922 21:26:22 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8, 0x9, 0xff, 0x80, 0x0, 0x780, 0x102, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0x3, 0x4a1}, 0x20, 0x0, 0x5, 0x9, 0x200, 0xfffffffa, 0x3f, 0x0, 0x9, 0x0, 0xfffffffffffffffd}, 0x0, 0x3, r0, 0x3) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x402, 0x40) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:22 executing program 7: syz_read_part_table(0x696e5b3, 0x6, 0x0) [ 2398.851926] loop6: detected capacity change from 0 to 215922 21:26:22 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x40086602, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:22 executing program 5: syz_read_part_table(0x600000000000000, 0x0, 0x0) [ 2398.895450] FAULT_INJECTION: forcing a failure. [ 2398.895450] name failslab, interval 1, probability 0, space 0, times 0 [ 2398.895482] CPU: 1 PID: 10112 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2398.895503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2398.895515] Call Trace: [ 2398.895522] [ 2398.895534] dump_stack_lvl+0x8b/0xb3 [ 2398.895562] should_fail.cold+0x5/0xa [ 2398.895581] ? create_object.isra.0+0x3a/0xa20 [ 2398.895610] should_failslab+0x5/0x10 [ 2398.895635] kmem_cache_alloc+0x5b/0x480 [ 2398.895671] create_object.isra.0+0x3a/0xa20 [ 2398.895690] ? kasan_unpoison+0x23/0x50 [ 2398.895718] __kmalloc+0x25b/0x440 [ 2398.895752] kobject_get_path+0xc0/0x1d0 21:26:22 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5452, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2398.895782] kobject_uevent_env+0x25c/0xfa0 [ 2398.895816] ? kernfs_put+0x42/0x50 [ 2398.895858] __loop_clr_fd+0x2f8/0x8b0 [ 2398.895896] lo_ioctl+0x632/0x1990 [ 2398.895928] ? vfs_fstatat+0x97/0xb0 [ 2398.895960] ? loop_set_status_old+0x1b0/0x1b0 [ 2398.895983] ? avc_ss_reset+0x180/0x180 [ 2398.896029] ? __lock_acquire+0xbac/0x6120 [ 2398.896071] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2398.896100] ? lock_is_held_type+0xd7/0x130 [ 2398.896125] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2398.896156] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2398.896183] ? do_vfs_ioctl+0x132/0x1610 [ 2398.896211] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2398.896242] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2398.896262] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2398.896291] ? blkdev_bszset+0x1f0/0x1f0 [ 2398.896309] ? selinux_inode_getsecctx+0x90/0x90 [ 2398.896337] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2398.896367] ? __ia32_sys_stat+0x70/0x70 [ 2398.896397] ? loop_set_status_old+0x1b0/0x1b0 [ 2398.896424] blkdev_ioctl+0x356/0x7f0 [ 2398.896443] ? blkdev_common_ioctl+0x1990/0x1990 [ 2398.896461] ? selinux_file_ioctl+0xb1/0x260 [ 2398.896489] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2398.896518] ? blkdev_common_ioctl+0x1990/0x1990 [ 2398.896539] __x64_sys_ioctl+0x196/0x210 [ 2398.896569] do_syscall_64+0x3b/0x90 [ 2398.896589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2398.896613] RIP: 0033:0x7f5b6be268d7 [ 2398.896628] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2398.896645] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2398.896662] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7 [ 2398.896674] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000a [ 2398.896685] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2398.896696] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008 [ 2398.896707] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2398.896739] 21:26:22 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 99) [ 2399.024230] loop4: detected capacity change from 0 to 215922 [ 2399.025050] loop5: detected capacity change from 0 to 264192 [ 2399.051743] loop2: detected capacity change from 0 to 215922 21:26:22 executing program 7: syz_read_part_table(0x696e5b3, 0x7, 0x0) [ 2399.090941] loop2: detected capacity change from 0 to 215922 [ 2399.172049] loop6: detected capacity change from 0 to 215922 [ 2399.190412] FAULT_INJECTION: forcing a failure. [ 2399.190412] name failslab, interval 1, probability 0, space 0, times 0 [ 2399.190439] CPU: 1 PID: 10140 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2399.190458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2399.190471] Call Trace: [ 2399.190476] [ 2399.190484] dump_stack_lvl+0x8b/0xb3 [ 2399.190511] should_fail.cold+0x5/0xa [ 2399.190528] ? skb_clone+0x170/0x3c0 [ 2399.190556] should_failslab+0x5/0x10 [ 2399.190580] kmem_cache_alloc+0x5b/0x480 [ 2399.190615] skb_clone+0x170/0x3c0 [ 2399.190643] netlink_broadcast+0x9b1/0xd70 [ 2399.190681] ? alloc_uevent_skb+0x1c2/0x210 [ 2399.190708] kobject_uevent_env+0xa6b/0xfa0 [ 2399.190734] ? kernfs_put+0x42/0x50 [ 2399.190789] __loop_clr_fd+0x2f8/0x8b0 [ 2399.190818] lo_ioctl+0x632/0x1990 [ 2399.190842] ? vfs_fstatat+0x97/0xb0 [ 2399.190873] ? loop_set_status_old+0x1b0/0x1b0 [ 2399.190894] ? avc_ss_reset+0x180/0x180 [ 2399.190942] ? __lock_acquire+0xbac/0x6120 [ 2399.190984] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2399.191013] ? lock_is_held_type+0xd7/0x130 [ 2399.191038] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2399.191068] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2399.191093] ? do_vfs_ioctl+0x132/0x1610 [ 2399.191121] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2399.191152] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2399.191172] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 2399.191199] ? blkdev_bszset+0x1f0/0x1f0 [ 2399.191220] ? selinux_inode_getsecctx+0x90/0x90 [ 2399.191251] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2399.191283] ? __ia32_sys_stat+0x70/0x70 [ 2399.191315] ? loop_set_status_old+0x1b0/0x1b0 [ 2399.191344] blkdev_ioctl+0x356/0x7f0 [ 2399.191363] ? blkdev_common_ioctl+0x1990/0x1990 [ 2399.191385] ? selinux_file_ioctl+0xb1/0x260 [ 2399.191412] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2399.191438] ? blkdev_common_ioctl+0x1990/0x1990 [ 2399.191459] __x64_sys_ioctl+0x196/0x210 [ 2399.191490] do_syscall_64+0x3b/0x90 [ 2399.191511] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2399.191535] RIP: 0033:0x7f5b6be268d7 [ 2399.191549] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2399.191566] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2399.191583] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7 [ 2399.191595] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000b [ 2399.191607] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2399.191619] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008 [ 2399.191630] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2399.191666] 21:26:37 executing program 5: syz_read_part_table(0x700000000000000, 0x0, 0x0) 21:26:37 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:26:37 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 100) 21:26:37 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x5460, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:37 executing program 7: syz_read_part_table(0x696e5b3, 0x8, 0x0) 21:26:37 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x40087602, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:37 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000000)='5', 0x1}], 0x300, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000013c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="ff843f0000fd5700e35dbe96c788df20"]) sendmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000001200)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @empty}, 0x2, 0x7, 0x4}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001180)="b8b9f3e0e3e8c9cae525f4b929f45026b2b2e194629670e141cbb2fd556171f4e41b49f858cf3730d3f46bcbaac2ded4262101d9390602824b9afb", 0x3b}, {&(0x7f0000001280)="6a790a625c449068632a18e620cddc4eb9a50d63070d3f585d7f30d7021392b516866824a8d82b9ae6327a7be79e9dfbeb16d7c4ba1875e2b0fdd15e1cc2b474f7e2f40b12de0299fc3187ac03f2545a3656400d979dc0fa48510c257ac6c1e6a40acf0cda207c19193ebd5920593fd130154ff4c6a26b8a19f28e2dcc82b1f5dfb9a6afcd1b4c03938fb5bbfaef8be0bfb44e4fc96c93d8ec32b8abbf0bc0556e36949352f6b15d2449418a161db22c35a81178e2a1083dd78355b1097ac930dabb5941f11a256d012d0b916f03486531d690ec9abedc81f01b7a813fbc85685a24bdc430ad6b4edef717c5833571", 0xef}], 0x2, &(0x7f0000001500)=[{0xf0, 0x1, 0x40, "f93710385a2735b0591b49e5e7a44d40b0f82c43871b8505d244aea19de14b18064ba7141ce7e0030073962f31660127bce0ab58d9fd5693a3baa857a1623ac83bad5fa19aebed850bdc376e6e1eecfca6be2bbba813f228bce602e7b8fbabf07412cdf4a15efdfb05ffd53c515ce79b1db9d8192047d0ff9b2baf79f922c29d8a9f8e668c2fcd01678628f816fb03ce0ff28ee96b83a2ba1b2ef6e14ddf0aff6c088359f2852bb98cd3a754c69567ccb52919390745feda391f9cf07129f911bb748356c0e22c91eb2363583d48414fabc7434b61107b443d6f28a402f0"}, {0xd0, 0x119, 0x8, "02b6ef625eb3404b0822647482c0cc6d5dd84ddeca607f2e33721299fc83c3a576119fe62e71fd9bb1e795c5c5c888518da932b048066033e4fc7bfb68ed9c0f93c6919b740c56715ac6fd7c43997155d8fbe46456892ed5907322f6af62daea7c4c0c2de48a198285c39cc5268c0d5e83086992daeb1037361e0557839120101acdd8c9883e2db7da58a86b3d53637e061354707a51333f413dc820fc99825e2af5e0c0609975b5662b464843e31784f95733bdb74307d482f4"}, {0xe8, 0x117, 0x5, "5f59a25ec4668a22ebb4d424b479405b29b25a33e945e2657af4535e5a4a928338e2ec8ad24a8784981b0416f2850acbf2458a81eafa2f2cc748d0ffde5ffde0dd41c47dafdbead31666e53573ae75fb23b32277df9c745b25e0e415afe8ee6b91f6952740ab55b3a13a5a46fb271a19b05e4cb9f4f3d8afeb33c9b65d1f1936f9ae3837c4d19639d8eadeb88a14064e20dd677a2e1ef6abe79178696c9d7f1ad6330863435c79368725cc2115316deb271c9b52dcacf84c1e42d6f2462755aa42d21853bf51a30a2ac83fc1adfc18f1cf"}, {0x100, 0x10f, 0x7, "93b06d147c2c5afc8c183f945cc3b641daff8c2fa9fb0ef8174f5118cc531f1b85f218432f63766fc27d96e6a61f8b56ff187a3941457126960022648528eb8a10761161dc79e28a73533115e101a6a4cd577c0d2f0ed8705216021888eb1f44fd2ded89d9dbe5d373ec6e9de947f63eb24cbd6afd4ce5c41d703506a45fe90d3afb091542b14dcd5b7e259a4f94457dd586d9e1ff26057aebe822d8e69ec59eb383436869c577a2971a056e1ced5a5b6eb94e71793ac210c4592b542433daa5e16e7977640161286f9d9392796bb3ffd641b97c497a55623bd655f576ba4acb4232b5189c5c25b74d39"}, {0xc8, 0x112, 0x400, "a306fc503a4d0cf7c6d7d3873f978dfd26454008d03e7b46dd05c28e94d16b065a308cff3b3543be9ea1be260cba143415917edbec163f59617e9e8d5cab1d1b74ada5e082ed69373f9b70ccf143c180732801eea88ea1d98c699124cb81db2dad22cbb11c51127a8404cec2383d6ec9838dd67d5c4a5b6c02a33d5460aa411de2b956686ad0423d5f57bd3f9e8ec957ef448884fa58f259340ec1b33c653ff40b80b7a0608b1544e7a4d71f185c19e212"}, {0xa0, 0x29, 0x1000, "0f5bae4ff88c9249313664bd5939ceb62e4fbafe40c0a044ff6b8a190f188fe4749b1823d8080b11eeb8594fc9aebe30240d3f0f7ca2e72b0897b11491c6694dcfc8fba9deac4011215df2de5df183b6afd24de9dbcacee77425f6d57e62e78e8db76a64a1735fff7c250dbf4672600daea79f0ebd73e97972bd698ac0b6f094f7e130cf676d2bd43835812f54c4"}], 0x510}}, {{&(0x7f0000001400)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e20, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x457f}}}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001a40)="5e703778e0d43b7e8644abe87f80dde34584d21518de217f7fd4e8b6428cbce8b5fb532c486af25265a64f4ef8919045a1087dc267ea4082c3e5fa3033782da36fa6f738b47b347f1cb0f5a6e85f5498530b21a42625e8e57e572da66183fed62550879f304b13bafa65c4bf11a75c4fc8150ad2b6943f9d40f9b2ae2d0eb84e4c163ff42fea945dae34f6230ba7009bb6ecdb5f", 0x94}, {&(0x7f0000001b00)="93d43e07f278e7d90c95882cdc5729fc014a93c8dfef2c0734", 0x19}, {&(0x7f0000001b40)="08315306e81da0e09d934ddc1593f13e9e81b892f63119a7449085dd094a88870472e039daa7bdcc01a39bd75786aeafcfa44d0866b63876408937b46a7a85101405164e0d3f77c93ed68200f82515f201b5ac82653185b9d9b8492f68042b617a3a6147637f75ed398958", 0x6b}, {&(0x7f0000001bc0)="694f53f0468b434b31f13ac8bc10c0b77733919a11ee7f29e3039aa964943483f569270384ccfad82b4fcb7271d88461af4486020c6b7908a0aa4d994193625a064886e41a31699d1fb7b8bca66ba2ae4469e4b9125ea30730d56a31134b38df00a3192d65e3382ad243e3e592cc11881acd6e43ea", 0x75}, {&(0x7f0000001c40)="4e78f58e96c010b445d150fb0ab2f19be050f5aad237a3bb53b851ea96", 0x1d}, {&(0x7f0000001c80)="32bfd176a04199fb37403ad12cfce5955db101fb862b3a0717a7ed71cea16dc1ff001b6a875b5c6b321615bcdd45da4e07bc4827b05b1ec9e6bb5d77435cc6d9a0b1e9fdf3c274206a1a07f636e6b57b6b4c027458b254bdebf9f9f0a6e04bd2290947f1eac030b17111438ecfc8fc5f429d4233db1c2b6273a29701266fc57e56776a4f91786fc5116815ca17d38a5d51792c3924ec1ccad98df935bb117131c47a60", 0xa3}], 0x6}}, {{&(0x7f0000001dc0)=@nl=@kern={0x10, 0x0, 0x0, 0x10000}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001e40)="892acd7725d8e72c1c6165059ab13d85d5fa44788e209e0271b14eab65c349577fcefcc258ec415dc30b036ee7a71d2502765c12353cb87f5381ea7869058513f56154e32f131cd5eaf775e3f03048c886b178a9a85cf343f3e89cfd5133df67f2d079d3ef09ae0509f7ce10c93dde470cde10b4d47850460bd7d7062c50a2b7230cc36b231249479209a3d570191855f9343000bdf0a6f5c312877445a75aa17fa11505278f688c734b5bfd1f03555b09df4f50", 0xb4}, {&(0x7f0000001f00)="fb8a7ab1829d11647a6e9acccff40ab938768323c7a96fb92c4340de0b32a2d9114347e4098c26fef59601a104fcf3f5d5266e2c1825130126904fae391d1132bcdb43a6b8", 0x45}], 0x2}}, {{&(0x7f0000001fc0)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000002040)="abed1282dabf9a4237800ca7f149e5e32ec09eb655384697d1930cc33d2b8ea74cf1283290f6dce2aa84c78fd068bfd36cf175e8349696ebfc05568e55f272a62f608fa3e845891a645ccf12a74c8d5000804258e34b56a15c28adfbfba15864b4d223e3c40ccf", 0x67}, {&(0x7f00000020c0)="375db249f410222af171ddc55d921eb54fc1c1da499f1badb1a2847bd7581a", 0x1f}, {&(0x7f0000002100)="55c70cf9694aa40668a378445e46aea9bfeee8", 0x13}, {&(0x7f0000002140)="f642579e23c6a8c7447758e2b460065d04667b8b755dede9fb4953f05e116496d922272b5f3dcf4d326169a2f77776756bf03929fb89956fba8a41d066c6afde94f563791c5e0fdd1da512cda07e4d2904a7608ddafd2bb6cce98604f46c00328f1e6a1c5a7c739aa1314e9f024c04ee21ed9f", 0x73}], 0x4}}], 0x4, 0x8004) r4 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f00000000c0)={'macvlan1\x00', 0x401}) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:37 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) read$rfkill(r2, &(0x7f0000000540), 0x8) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000f720001e6e01000000", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x81, 0x1, 0x7, 0x7f, 0x0, 0x8, 0x80400, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x100000000}, 0x80, 0x1, 0x0, 0x7, 0xffff, 0x2, 0x1, 0x0, 0x5, 0x0, 0x4}, r4, 0xb, r6, 0x0) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e24, @private=0xa010100}, 0x312, 0x0, 0x0, 0x0, 0xff01, &(0x7f00000000c0)='netdevsim0\x00', 0x5, 0x4, 0x3}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2414.034417] loop5: detected capacity change from 0 to 264192 [ 2414.089198] loop6: detected capacity change from 0 to 215922 [ 2414.092461] loop5: detected capacity change from 0 to 264192 [ 2414.099765] FAULT_INJECTION: forcing a failure. [ 2414.099765] name failslab, interval 1, probability 0, space 0, times 0 [ 2414.099797] CPU: 1 PID: 10159 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1 [ 2414.099821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2414.099837] Call Trace: [ 2414.099843] [ 2414.099851] dump_stack_lvl+0x8b/0xb3 [ 2414.099884] should_fail.cold+0x5/0xa [ 2414.099907] ? skb_clone+0x170/0x3c0 [ 2414.099938] should_failslab+0x5/0x10 [ 2414.099968] kmem_cache_alloc+0x5b/0x480 [ 2414.100011] skb_clone+0x170/0x3c0 [ 2414.100046] netlink_broadcast+0x9b1/0xd70 [ 2414.100091] ? alloc_uevent_skb+0x1c2/0x210 [ 2414.100124] kobject_uevent_env+0xa6b/0xfa0 [ 2414.100156] ? kernfs_put+0x42/0x50 [ 2414.100200] __loop_clr_fd+0x2f8/0x8b0 [ 2414.100235] lo_ioctl+0x632/0x1990 [ 2414.100265] ? vfs_fstatat+0x97/0xb0 [ 2414.100305] ? loop_set_status_old+0x1b0/0x1b0 [ 2414.100333] ? avc_ss_reset+0x180/0x180 [ 2414.100389] ? __lock_acquire+0xbac/0x6120 [ 2414.100439] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2414.100474] ? lock_is_held_type+0xd7/0x130 [ 2414.100503] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2414.100540] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2414.100575] ? do_vfs_ioctl+0x132/0x1610 [ 2414.100610] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 2414.100647] ? blkdev_common_ioctl+0x1ad/0x1990 [ 2414.100671] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 21:26:37 executing program 7: syz_read_part_table(0x696e5b3, 0x9, 0x0) [ 2414.100706] ? blkdev_bszset+0x1f0/0x1f0 [ 2414.100729] ? selinux_inode_getsecctx+0x90/0x90 [ 2414.100766] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2414.100804] ? __ia32_sys_stat+0x70/0x70 [ 2414.100840] ? loop_set_status_old+0x1b0/0x1b0 [ 2414.100874] blkdev_ioctl+0x356/0x7f0 [ 2414.100896] ? blkdev_common_ioctl+0x1990/0x1990 [ 2414.100918] ? selinux_file_ioctl+0xb1/0x260 [ 2414.100956] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2414.100990] ? blkdev_common_ioctl+0x1990/0x1990 [ 2414.101018] __x64_sys_ioctl+0x196/0x210 [ 2414.101057] do_syscall_64+0x3b/0x90 [ 2414.101083] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2414.101113] RIP: 0033:0x7f5b6be268d7 [ 2414.101130] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2414.101152] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2414.101173] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7 [ 2414.101188] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000b 21:26:37 executing program 5: syz_read_part_table(0x1200000000000000, 0x0, 0x0) 21:26:37 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2414.101201] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90 [ 2414.101215] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008 [ 2414.101229] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80 [ 2414.101268] [ 2414.110382] loop2: detected capacity change from 0 to 215922 21:26:37 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x401c5820, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2414.129017] loop4: detected capacity change from 0 to 215922 [ 2414.149704] 9pnet_fd: p9_fd_create_tcp (10162): problem connecting socket to 127.0.0.1 [ 2414.154236] loop2: detected capacity change from 0 to 215922 [ 2414.283980] loop5: detected capacity change from 0 to 264192 [ 2414.302403] loop5: detected capacity change from 0 to 264192 [ 2414.411302] loop6: detected capacity change from 0 to 215922 [ 2414.451439] loop4: detected capacity change from 0 to 215922 [ 2414.494167] loop4: detected capacity change from 0 to 215922 21:26:54 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f00000000c0)={0x2, 0x7bf39ecc, 0x1ff, 0x0, 0x3f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:54 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:26:54 executing program 5: syz_read_part_table(0x2000000000000000, 0x0, 0x0) 21:26:54 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x4020940d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:54 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0xffffffffffffffff, r0, 0xb) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x28, r7, 0xd0b, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX={0x8}, @ETHTOOL_A_RINGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x28}}, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f00000003c0)={@broadcast, @broadcast, r6}, 0xc) socket$inet_udp(0x2, 0x2, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:54 executing program 7: syz_read_part_table(0x696e5b3, 0xa, 0x0) 21:26:54 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x2, 0x0) 21:26:54 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x40049409, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:54 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x3, 0x0) [ 2431.356004] loop4: detected capacity change from 0 to 215922 21:26:55 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x4, 0x0) [ 2431.366938] loop5: detected capacity change from 0 to 264192 [ 2431.380448] loop5: detected capacity change from 0 to 264192 [ 2431.388723] 9pnet_fd: p9_fd_create_tcp (10198): problem connecting socket to 127.0.0.1 [ 2431.399883] loop2: detected capacity change from 0 to 215922 21:26:55 executing program 7: syz_read_part_table(0x696e5b3, 0xd, 0x0) 21:26:55 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @local}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) r6 = clone3(&(0x7f0000004c00)={0xc0000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) capset(&(0x7f0000000000)={0x20080522, r6}, &(0x7f0000000040)={0xfffffff9, 0xe385, 0x200, 0x9, 0x80000, 0x7f}) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x5, 0x8, 0xc7, 0x9, 0x0, 0x1, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x10001, 0x20000000}, 0x80, 0x29b, 0x6, 0x9, 0x0, 0x6, 0x200, 0x0, 0x8000, 0x0, 0x4}, r6, 0xa, 0xffffffffffffffff, 0xa) sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r5, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, @in_args={0x4}}, './file0\x00'}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:55 executing program 5: syz_read_part_table(0x2ccf95a600000000, 0x0, 0x0) [ 2431.458171] loop2: detected capacity change from 0 to 215922 21:26:55 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x80086601, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2431.474980] loop5: detected capacity change from 0 to 264192 [ 2431.493667] loop5: detected capacity change from 0 to 264192 21:26:55 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:26:55 executing program 5: syz_read_part_table(0x3f00000000000000, 0x0, 0x0) 21:26:55 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x5, 0x0) 21:26:55 executing program 7: syz_read_part_table(0x696e5b3, 0xf, 0x0) [ 2431.585223] loop5: detected capacity change from 0 to 264192 [ 2431.600619] loop5: detected capacity change from 0 to 264192 [ 2431.636051] loop4: detected capacity change from 0 to 215922 [ 2431.673170] loop4: detected capacity change from 0 to 215922 21:27:13 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x80087601, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:13 executing program 7: syz_read_part_table(0x696e5b3, 0x11, 0x0) 21:27:13 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:27:13 executing program 5: syz_read_part_table(0x4800000000000000, 0x0, 0x0) 21:27:13 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000440)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0xe8, 0xbe, 0x5, 0x0, 0x1000, 0x84010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x16b3e075, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x40002, 0x1f, 0x0, 0x9, 0x9, 0x1f, 0x3, 0x0, 0x6, 0x0, 0x7ff}, 0x0, 0xe, r5, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:13 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x2a, 0x3, 0xfffeffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r5, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r6}, @void}}}, 0x1c}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000a00)=@broute={'broute\x00', 0x20, 0x3, 0x53a, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000480), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x11, 0x11, 0x8917, 'lo\x00', 'erspan0\x00', 'team_slave_1\x00', 'veth1_to_hsr\x00', @multicast, [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3c}, [0xff, 0x71b125de0e3f046f, 0xff], 0x6e, 0x6e, 0x9e, [], [], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x4}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{0x9, 0x10, 0xfbfb, 'veth1_to_bridge\x00', 'veth1_macvtap\x00', 'nr0\x00', 'vxcan1\x00', @remote, [0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0xff], 0xbe, 0x236, 0x26e, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv4=@empty, [0x0, 0xffffffff, 0xffffffff], 0x4e20, 0x5e, 0x2, 0xfff9, 0x20, 0x10}}}], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0xfdc2, 'system_u:object_r:boot_t:s0\x00'}}}, @common=@ERROR={'ERROR\x00', 0x20, {"8000d148724a6e794d9a3f3e98d1c3f125cfcfdaf46505dbaf4ff20f73cf"}}], @common=@dnat={'dnat\x00', 0x10, {{@random="b8f35c91273a"}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x3, 0x2, 0x8884, 'dummy0\x00', 'veth1_to_team\x00', 'sit0\x00', 'veth1_virt_wifi\x00', @multicast, [0xff, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x27}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0x9e, 0x166, 0x19e, [@cgroup0={{'cgroup\x00', 0x0, 0x8}, {{0x7, 0x1}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x3ff, 0x5, 0x4, 0x0, 0x0, "70e8a24510d098d835dfa8c583782a5a8b33b0b13fb3edfd3581348eca49592f7d98f89e432d5325030208b386f28a646e6bae12e22fa89d5bf4163d43266b0b"}}}, @common=@log={'log\x00', 0x28, {{0x40, "3e255a49e190c307f1061b2a4c8c4cd524ee6e68a4eebb1f1622d4c2055b", 0x5}}}], @common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xfffffffffffffffc}}}}]}]}, 0x5b2) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r3, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x910, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x0, 0x2d}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0xd1) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:13 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6, 0x0) 21:27:13 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x40086602, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2450.358855] loop5: detected capacity change from 0 to 264192 [ 2450.418779] loop2: detected capacity change from 0 to 215922 [ 2450.423616] 9pnet_fd: p9_fd_create_tcp (10256): problem connecting socket to 127.0.0.1 [ 2450.428923] loop4: detected capacity change from 0 to 215922 [ 2450.458003] loop2: detected capacity change from 0 to 215922 21:27:14 executing program 7: syz_read_part_table(0x696e5b3, 0x12, 0x0) [ 2450.472032] loop5: detected capacity change from 0 to 264192 21:27:14 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:14 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x40087602, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:14 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x801c581f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2450.703402] loop4: detected capacity change from 0 to 215922 [ 2450.716863] loop2: detected capacity change from 0 to 215922 21:27:14 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x7, 0x0) 21:27:14 executing program 5: syz_read_part_table(0x4c00000000000000, 0x0, 0x0) 21:27:14 executing program 7: syz_read_part_table(0x696e5b3, 0x48, 0x0) 21:27:14 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x800001f, 0x0, 0x0) [ 2450.797942] loop5: detected capacity change from 0 to 264192 [ 2450.817798] loop5: detected capacity change from 0 to 264192 21:27:31 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:31 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:27:31 executing program 5: syz_read_part_table(0x6800000000000000, 0x0, 0x0) 21:27:31 executing program 7: syz_read_part_table(0x696e5b3, 0x4c, 0x0) 21:27:31 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x401c5820, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:31 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @dev}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast1}, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x5, 0x5}}, './file0\x00'}) recvmsg$unix(r4, &(0x7f0000000640)={&(0x7f0000000400)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000480)=""/96, 0x60}, {&(0x7f0000000500)=""/183, 0xb7}], 0x2, &(0x7f0000000600)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x22000) 21:27:31 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x8, 0x0) 21:27:31 executing program 0: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000b40)={0x0, 0xfffffffffffffffb, 0xe5, 0x0, @scatter={0xa, 0x0, &(0x7f00000008c0)=[{&(0x7f00000003c0)=""/174, 0xae}, {&(0x7f0000000480)=""/81, 0x51}, {&(0x7f0000000500)=""/155, 0x9b}, {&(0x7f00000005c0)=""/93, 0x5d}, {&(0x7f0000000640)=""/110, 0x6e}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000780)}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/225, 0xe1}]}, &(0x7f0000000980)="ebbc9b5d9f04fba4e50de20f8778c81a1fa7e5aec94a4d4f445b0eef0b07260799cbb72b8913d7b59d5759ef5028544fa69ad64d18aadc50ce5441d4caa565f323007025b42b1218ee99ce1b2ebc716f0478d91a692fe259ea99c193fa6c90305b15beb1ef2766eea122f3e8e54fd47c48c7e064289e5887475cdcc726c05cd058cfc80e33a095ce11011442db2abc921367d52a9524a10cca19d99c7f0876d363fdaca9926230d3e523c84918932aba7e0eef821fadba53d6d2a1859826ce53280f5d67b1ec6f28aa133b44d135f4930fef0494a4875a8b7cc9584c59620d88c3d676e5e4", &(0x7f0000000a80)=""/115, 0x8, 0x10000, 0x0, &(0x7f0000000b00)}) syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2468.047638] loop5: detected capacity change from 0 to 264192 [ 2468.059352] loop5: detected capacity change from 0 to 264192 [ 2468.067839] loop2: detected capacity change from 0 to 215922 21:27:31 executing program 7: syz_read_part_table(0x696e5b3, 0x55, 0x0) [ 2468.143604] loop4: detected capacity change from 0 to 215922 [ 2468.150923] 9pnet_fd: p9_fd_create_tcp (10310): problem connecting socket to 127.0.0.1 21:27:31 executing program 5: syz_read_part_table(0x6c00000000000000, 0x0, 0x0) [ 2468.168969] loop2: detected capacity change from 0 to 215922 [ 2468.201859] loop4: detected capacity change from 0 to 215922 21:27:31 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x4020940d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:31 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x9, 0x0) 21:27:31 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="c6000600"], 0x18}, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f00000000c0)=0x5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = socket$inet6(0xa, 0x6, 0x1876) r6 = getpgrp(0xffffffffffffffff) newfstatat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) sendmsg$unix(r3, &(0x7f0000000e00)={&(0x7f00000004c0)=@abs={0x62c033b897e44423, 0x0, 0x4e22}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000540)="a0739bd3fac2ce5eef6eec74f230f625a795e7cb1f082a80e82d640057543b943a3df432799a958688b637b7b40c1500acbebd79ca19fb41b8e2ac64b2eb1c9adda140cf5a4597be01084b65891efbf6a3bd4afda4b6b108ca22d6258de96ef988a723c965a379262d31f8db6d34644f3ce7854e1aa763e5b7042c6d97b2fb29b3937480a1700a00bd118d2a1f10956dadc7201cda8c15f08dbf49bd3cc7d5c9", 0xa0}, {&(0x7f0000000600)="cdaba26343c1ac36f04b8a7f9592dc6f50fcaafe36dcc4618e014f99e8dfedcddb78eba1", 0x24}, {&(0x7f0000000640)="3a656a106334f693757b8fd48fcc88b0bb478f76ab2e956eaa6a5cf067c3294122", 0x21}, {&(0x7f0000000680)="bc7c07597e7037d38de14cf4d5d451a5fee71f7812eabaa34ddf523334c4dc178442d36b3dd233", 0x27}, {&(0x7f00000006c0)="6cd867b6caeeecfd4d2ba7f7b0a26ea5349435b336534b9f956e8cf69f948a5dde15", 0x22}, {&(0x7f0000000700)="bed2932d519ed1a354512fe5ce83728fdef3f6bd2dde579d5a7ea2b47c71628d22c2745628de0a684340b3eeacfd0ec79c4ed74afbe09514b509988066623c109ad355ba530b874b98d5d3f11e5cfc658eb1a4a1377b6dae608d7b1424498a207fcf48636bc667c8232f5e279c7167", 0x6f}, {&(0x7f0000000780)="e68c675d9753c2b34ffd4978bd960125bd4688e59d1a5f851a8fe86447f67666ce92bd5f480b2037fe66d387242cfd1f0385e42768c298e3ebcea71f8a99d194bec4c821ceda5a443d3e89025cf3f2cd7f05c5dd0cba6bc759eee844506ad828a7791976ea67d0d25f285b53b8861c1e7f947bc112d953afd95427a33e781bb403236a7f804c95a449c82ec4a99b220de6b7319efa833451dabe182ba367c1029645920a560d2cd01759dfeb4aa93d7e946a5901d91a6bb86d11a1f1639284", 0xbf}], 0x7, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r4, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c0000fb00000000000100001902000000d5aae810e069558067c027bba0c11c4446d9cdecd0d2d967389c07f63ce4b22a7135f625c8bdfb3d2cff5d903065dad64d9e249ce15cdceb053b6bbb7418488ea460", @ANYRES32, @ANYRES32, @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0x90, 0x4040}, 0x40000) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0xe302}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) getsockopt$inet_buf(r4, 0x0, 0x2e, &(0x7f0000000400)=""/84, &(0x7f0000000480)=0x54) 21:27:31 executing program 7: syz_read_part_table(0x696e5b3, 0x68, 0x0) 21:27:31 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2468.330684] audit: type=1400 audit(1652131651.972:11): avc: denied { create } for pid=10324 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 21:27:32 executing program 5: syz_read_part_table(0x7400000000000000, 0x0, 0x0) [ 2468.398023] loop4: detected capacity change from 0 to 215922 [ 2468.404061] loop2: detected capacity change from 0 to 215922 [ 2468.429242] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2468.429275] Buffer I/O error on dev loop2, logical block 0, async page read [ 2468.429346] loop2: unable to read partition table 21:27:32 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x80) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)={0x5, 0xff, 0x5, 0x5925}) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2468.429451] loop2: partition table beyond EOD, truncated [ 2468.466852] loop2: detected capacity change from 0 to 215922 [ 2468.478468] loop5: detected capacity change from 0 to 264192 [ 2468.530991] loop5: detected capacity change from 0 to 264192 21:27:45 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:27:45 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xa, 0x0) 21:27:45 executing program 0: getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f00000000c0), &(0x7f00000003c0)=0x10) syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000440)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='/dev/vcsa#\x00') ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000480)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:45 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0189436, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:45 executing program 3: syz_open_dev$vcsa(&(0x7f00000000c0), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000180)={0xfffffffb, 0x3, 0x7fff, 0x2, 0x9, "0dfb13f5f39c4c7edbc7069a66caceaba4ecfd"}) 21:27:45 executing program 7: syz_read_part_table(0x696e5b3, 0x6c, 0x0) 21:27:45 executing program 5: syz_read_part_table(0x7a00000000000000, 0x0, 0x0) 21:27:45 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x80086601, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2482.108345] loop5: detected capacity change from 0 to 264192 [ 2482.144671] loop2: detected capacity change from 0 to 215922 [ 2482.150650] loop5: detected capacity change from 0 to 264192 [ 2482.153030] 9pnet_fd: p9_fd_create_tcp (10363): problem connecting socket to 127.0.0.1 [ 2482.162422] loop4: detected capacity change from 0 to 215922 21:27:45 executing program 7: syz_read_part_table(0x696e5b3, 0x74, 0x0) [ 2482.196574] loop2: detected capacity change from 0 to 215922 [ 2482.199795] loop4: detected capacity change from 0 to 215922 21:27:45 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xd, 0x0) 21:27:45 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1a) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:45 executing program 5: syz_read_part_table(0x97ffffff00000000, 0x0, 0x0) 21:27:45 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc020660b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:27:45 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x80087601, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2482.350173] loop4: detected capacity change from 0 to 215922 21:27:46 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={0xffffffffffffffff, 0x7, 0x3ff, 0x54}) openat(r2, &(0x7f00000003c0)='./file0\x00', 0x10440, 0x44) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/keys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x5, 0x1e, 0x60, 0x5, 0x0, 0x430, 0x85, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x61, 0x1, @perf_bp={&(0x7f0000000400)}, 0x80400, 0x3, 0x7, 0x2, 0xffffffffffffffff, 0x1b, 0x1f, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) [ 2482.425256] loop5: detected capacity change from 0 to 264192 21:27:46 executing program 7: syz_read_part_table(0x696e5b3, 0x7a, 0x0) [ 2482.486489] loop2: detected capacity change from 0 to 215922 [ 2482.559053] loop2: detected capacity change from 0 to 215922 21:28:04 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001000000"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:28:04 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x81, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x40, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)={0x0, @aes256, 0x0, @desc1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:04 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x801c581f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:04 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000004, 0x20010, r0, 0x6) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[r2, r1, r4, r5], 0x4) 21:28:04 executing program 7: syz_read_part_table(0x696e5b3, 0x90, 0x0) 21:28:04 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481223, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:04 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xf, 0x0) 21:28:04 executing program 5: syz_read_part_table(0xf6ffffff00000000, 0x0, 0x0) [ 2500.658399] loop5: detected capacity change from 0 to 264192 [ 2500.661065] loop2: detected capacity change from 0 to 215922 21:28:04 executing program 7: syz_read_part_table(0x696e5b3, 0xf0, 0x0) [ 2500.689926] loop5: detected capacity change from 0 to 264192 [ 2500.702688] 9pnet_fd: p9_fd_create_tcp (10415): problem connecting socket to 127.0.0.1 [ 2500.721920] loop2: detected capacity change from 0 to 215922 [ 2500.740092] loop4: detected capacity change from 0 to 215922 21:28:04 executing program 5: syz_read_part_table(0xfcfdffff00000000, 0x0, 0x0) 21:28:04 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x10001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000580)="fe7013405b443ccab61d44dcbe2bd383bec7b60c6e5338dee9224c142286fba013913a020b0aee7247ac3e9a3b2a8a6cf766664c5eb35a8d91afd7bb53bd55433dcf888fd4d600d5a881e972149f53a2953fd152596c2fbd617f05352a8f520bf5a19dfe4fa6a8c6779d6c88f8cdb3c303e9e88e17817118de21c2cc749971d7f773ce764d7f52b55b85f0e757d5d78ba8a57f44b1718aa4bacc31c20116ee557935ec6b1e111fa2ef", 0xa9, 0x400}, {&(0x7f0000000640)="aa0b8845eee8c234f4655a74cd2da3540f085f0b90bd523aac089d4b777b84973e6d97bc1407deb9e26f5c8f640b9de901bbdf01b620d61279edf7261ef136a96bb887dc1ad30a910eb59bc4a2fb63932dba5881f2e61ce26255e08a15b234577c15fa7916fac671acbe62facfd6cf38043fd673db7cfc76b849a2382e1fcdd20fb42e6fe15dc65cdc66cecb6a67fd54836ddb6c1032713991d36e37c8be940c47e34f665cdcc2b98a5ecc996a9dd62207a71590c2", 0xb5, 0x1}, {&(0x7f0000000700)="033033048fff3b5b7ea27d8b7ca29e871e1c47d711199039e75ae48a8280dcc6fffa9eebe381a929dbd0542e4c1d0305cc555d60c1865251c9e85853675e558d5aec89c6d7ef24c1391660d75313623a66960a53b8b784c9ae9cb271c1719b2ff3fc478b80e64ecb7087650152794b7d0cd39aade39a34270771400be2f5bf294c02d74c3f07f74adb2219d7c566ee588288dcce1c966ad60793fa1ea41fc43306ec6b23978238ec35f31ec98feaab4284783ed04bbd0f781ba6311fdb", 0xbd, 0x8}], 0x800040, &(0x7f0000000840)={[{@rodir}, {@uni_xlate}], [{@uid_gt={'uid>', 0xee00}}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x88, 0xc7, 0xc1, 0x0, 0x8, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x0, 0x400}, 0x5008, 0x10001, 0xfff, 0x2, 0x9, 0x80000000, 0x20, 0x0, 0x14, 0x0, 0x5}, r5, 0xa, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(&(0x7f00000003c0)={0x6, 0x80, 0x8, 0x6, 0x3, 0x9, 0x0, 0x6, 0x6081, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0xc98866506df7a9e4, @perf_bp={&(0x7f00000000c0), 0xc}, 0x413c, 0xffffffffffffff3e, 0xffff, 0x5, 0x3f, 0x2, 0x1f, 0x0, 0x7, 0x0, 0x4}, r0, 0xd, r2, 0xa) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:04 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:04 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481225, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2500.851114] loop5: detected capacity change from 0 to 264192 21:28:04 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) sendto$inet6(r4, &(0x7f0000000480)="ea26335681a719e4ad67851c4c22ed0a9e17e50cda6dc9ee5d5d7d509e7be49eeef5f93ef4784f39561b76061f1f77fcfe40dd277219766bb1b7418eb0c3e76cd919df9f8f1c0a9374f5a536497371435dbc24dda1addeead8e13ed1857cfa39e66f1193c31d7c8dd3cb89fe859f6a5b935f27483890c46d563abedf18d9334c05ba20003df6030d385fa4ca2cd435b29d0c312a71f8d3dbd976dc0d4ab1202736b0f85870", 0xa5, 0x0, &(0x7f0000000540)={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, '\x00', 0xf}, 0x3}, 0x1c) sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8025}, 0x10000000) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:04 executing program 7: syz_read_part_table(0x696e5b3, 0xfe, 0x0) 21:28:04 executing program 5: syz_read_part_table(0xfdfdffff00000000, 0x0, 0x0) [ 2500.941579] loop5: detected capacity change from 0 to 264192 [ 2500.942397] loop2: detected capacity change from 0 to 215922 [ 2500.957750] loop5: detected capacity change from 0 to 264192 [ 2500.991064] loop2: detected capacity change from 0 to 215922 [ 2500.992936] loop4: detected capacity change from 0 to 215922 21:28:21 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001000000"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:28:21 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048122a, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:21 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) r4 = eventfd(0x9) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = socket$inet6(0xa, 0x3, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r7, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) ppoll(&(0x7f00000000c0)=[{r0, 0x9185}, {r4, 0x4001}, {r0, 0x2101}, {r2, 0x133c}, {r5, 0x6082}, {r6, 0x2002}, {r7}], 0x7, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000400)={[0x5]}, 0x8) 21:28:21 executing program 7: syz_read_part_table(0x696e5b3, 0x300, 0x0) 21:28:21 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x40}}, './file0\x00'}) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000003c0)={0xe4, "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"}) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:21 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:21 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x11, 0x0) 21:28:21 executing program 5: syz_read_part_table(0xfdffffff00000000, 0x0, 0x0) [ 2518.292834] loop2: detected capacity change from 0 to 215922 [ 2518.303881] loop4: detected capacity change from 0 to 215922 [ 2518.315970] loop5: detected capacity change from 0 to 264192 [ 2518.319037] 9pnet_fd: p9_fd_create_tcp (10464): problem connecting socket to 127.0.0.1 [ 2518.333409] loop5: detected capacity change from 0 to 264192 [ 2518.347185] loop2: detected capacity change from 0 to 215922 21:28:22 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x12, 0x0) 21:28:22 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r2, 0xfffffffffffffffd, 0x4840) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:22 executing program 5: syz_read_part_table(0xfeffffffffffffff, 0x0, 0x0) 21:28:22 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0189436, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:22 executing program 7: syz_read_part_table(0x696e5b3, 0x500, 0x0) 21:28:22 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048122b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:22 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x48, 0x0) 21:28:22 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="02000000"], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0) copy_file_range(r3, 0x0, r6, &(0x7f00000000c0), 0x1ff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2518.553058] loop5: detected capacity change from 0 to 264192 [ 2518.587114] loop2: detected capacity change from 0 to 215922 [ 2518.612396] loop4: detected capacity change from 0 to 215922 [ 2518.658952] loop2: detected capacity change from 0 to 215922 21:28:36 executing program 5: syz_read_part_table(0xffffffff00000000, 0x0, 0x0) 21:28:36 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048122d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2532.495790] loop5: detected capacity change from 0 to 264192 21:28:36 executing program 7: syz_read_part_table(0x696e5b3, 0x600, 0x0) 21:28:36 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24, 0x0, 0x0, 0x0, 0xffc0}) r2 = signalfd4(r1, &(0x7f00000000c0)={[0xa1]}, 0x8, 0x80000) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f00000003c0)={0x2, {0x2, 0x0, 0x8, 0xfff8, 0xcb2, 0x3}}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0x8, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:36 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x4c, 0x0) 21:28:36 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001000000"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:28:36 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc020660b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:36 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0xb6f6de2d1df1a102) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f00000003c0)='./file0\x00', 0x2, 0x6, &(0x7f0000000740)=[{&(0x7f0000000400)="09255e6b2caba338b9463337fc78e8f7595f3d3c09f0e056fc58949aefb287a8d66d7d7989ba71eff6bd48a51ebe3e219b561f3bf0a1a7ebf45b4bb6f98bfa24e50dd69103c3db292b2bc618bee784ff011a7ca7901161e9c08c4555a3e28d2641b99e336512", 0x66, 0x81}, {&(0x7f0000000480)="fd87cb979d9d7ee3cfa19b841f7c283e92a0027f0b8fe9b927f4c76e7d6421fdd3805c800db2837169151f6b16552c087f3dd6f126f06f03e8b7577b5fdf2adac4813505197e402ff28701d9ee9af6d77b1abe1b240e9a8e59828ced1ddc58fc2555e4f41f268aac2acb1a2415", 0x6d, 0x9}, {&(0x7f0000000500)="ae39af501a3ed1529fbbdc61e365805a8319799325ae229b02ff1706ecec03ad153ebc673d68da39f02e10a76c", 0x2d, 0xa168}, {&(0x7f0000000540)="db589821abf839798a077ff2cd4a0dba0f3961d97041ecba5e231b70c8645b70740708793de625cfe463cb35b0f213e452fdfa5121697f677e4f786e8ffc0bccd3bc908c1035ef634c7242d75f745ca92b8ca7b00e9c6a0d12b29b17dd19812533d4bb803311d9b3c14536ebcf29c8ccc2fcddc404ab2f953266bb9c1d6eaca2b3a40333e57950d2c2d2bf3e954609d2705f95ef6d8663ba250b7eb20c51dfaeb09447a2fcbcd6b2a0cf7ee84e9240a718bd75a987ac58c9393729bddf7ce256c3bf8672acfc1f3e0912aeff2fc594c388facfbc737783405b95fb54e10eb8b19a11a14268b669f089bc013b7aee", 0xee, 0x9}, {&(0x7f0000000640)="4122144659d17bbea0f7702e3df5d71ab0c9595673de213e39c032bb0ac340246a7e7d90925fbc15cbcd0bfba516ff3e37e722f0015f47303adb7a73b278d458faa8558112", 0x45, 0x100000000}, {&(0x7f00000006c0)="605b46c8ea9429f2b127d53043c94ba487e570732c6d3d5398d3b809f798dd144f867b19e397cc238b0e9b622643f112dd1c8a3015a462ed22e02b757ec64df602aa1182c199f541e4c84934c5609b29023500f5f863d433a8fe228b5f76", 0x5e, 0x6000000000}], 0x1000, &(0x7f00000008c0)={[{@session={'session', 0x3d, 0xe}}, {@mode={'mode', 0x3d, 0xffff}}, {@nocompress}, {@cruft}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fowner_gt={'fowner>', r1}}]}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2532.533967] 9pnet_fd: p9_fd_create_tcp (10509): problem connecting socket to 127.0.0.1 [ 2532.543145] loop4: detected capacity change from 0 to 215922 21:28:36 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x20, 0x48, 0x81, 0x8, 0x0, 0x401, 0xa08, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x8, @perf_bp={&(0x7f0000000440), 0x1}, 0x7404, 0x1, 0xff, 0x8, 0xb895, 0x2, 0x3, 0x0, 0x3, 0x0, 0x2}, r3, 0xd, r0, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x67aaa4fec5771cc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x7}, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='children\x00') [ 2532.570162] loop5: detected capacity change from 0 to 264192 21:28:36 executing program 7: syz_read_part_table(0x696e5b3, 0x700, 0x0) 21:28:36 executing program 5: syz_read_part_table(0xfffffffffffff000, 0x0, 0x0) [ 2532.637729] loop2: detected capacity change from 0 to 215922 [ 2532.659334] loop2: detected capacity change from 0 to 215922 21:28:36 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x55, 0x0) 21:28:36 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048122e, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:36 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) r2 = perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0xad2, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, r1, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x1, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2532.733061] loop5: detected capacity change from 0 to 264192 [ 2532.798390] loop4: detected capacity change from 0 to 215922 21:28:36 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481223, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:36 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x68, 0x0) [ 2532.842371] loop4: detected capacity change from 0 to 215922 [ 2532.873270] loop2: detected capacity change from 0 to 215922 [ 2532.897688] loop2: detected capacity change from 0 to 215922 21:28:53 executing program 5: syz_read_part_table(0xfffffffffffffffe, 0x0, 0x0) 21:28:53 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:28:53 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481225, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:53 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:53 executing program 7: syz_read_part_table(0x696e5b3, 0x900, 0x0) 21:28:53 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) r2 = syz_io_uring_complete(0x0) ioctl$DVD_READ_STRUCT(r2, 0x5390, &(0x7f00000003c0)=@physical={0x0, 0x3, [{0xd, 0xa, 0x3, 0x7, 0x8, 0x0, 0x0, 0x2, 0x2, 0x0, 0x4, 0x1ff, 0x4}, {0xc, 0x6, 0x6, 0x5, 0x3, 0x1, 0x0, 0x3, 0xb, 0x1, 0x37c, 0xff, 0x9}, {0x6, 0x9, 0x3, 0x2, 0xd, 0x1, 0x1, 0x5, 0x0, 0x1, 0xa86, 0xffffffff, 0xffffc625}, {0x3, 0x7, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x9, 0x6, 0xfffffffc}]}) 21:28:53 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048122f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:53 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6c, 0x0) [ 2549.750815] loop5: detected capacity change from 0 to 264192 [ 2549.765719] loop2: detected capacity change from 0 to 215922 [ 2549.783236] 9pnet_fd: p9_fd_create_tcp (10570): problem connecting socket to 127.0.0.1 21:28:53 executing program 7: syz_read_part_table(0x696e5b3, 0xa00, 0x0) [ 2549.841577] loop5: detected capacity change from 0 to 264192 [ 2549.864459] loop4: detected capacity change from 0 to 215922 [ 2549.867686] loop2: detected capacity change from 0 to 215922 21:28:53 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x74, 0x0) 21:28:53 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x0, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x6, 0x2977}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="0100090000000000180000000b6afa5ebec766e5d6700ac1d7bc7296d72e208d74b61ef13820293e67793388310ae49087143f28099994dcb0285f64accc89", @ANYRES32=r1, @ANYBLOB='a\b\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="14000008000000000000000000000000687566e0ab408f236372e8e48a0d8174d3a5782c996ce5a7417eb37ae4af8881fe137a5d98c7", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x840, 0x22) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000700), r0) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="3c020000", @ANYRES16=r4, @ANYBLOB="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"], 0x23c}, 0x1, 0x0, 0x0, 0x880}, 0x40000) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x8}, 0x0, 0xe, 0xffffffffffffffff, 0x9) syz_read_part_table(0x696e5b3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7, @ANYBLOB], 0x18}, 0x0) waitid$P_PIDFD(0x3, r7, &(0x7f00000003c0), 0x1000006, &(0x7f0000000440)) 21:28:53 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481230, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:53 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:28:53 executing program 7: syz_read_part_table(0x696e5b3, 0xd00, 0x0) 21:28:53 executing program 5: syz_read_part_table(0xffffffffffffffff, 0x0, 0x0) 21:28:53 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048122a, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:28:53 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2550.056362] loop4: detected capacity change from 0 to 215922 [ 2550.058246] loop5: detected capacity change from 0 to 264192 [ 2550.059814] 9pnet_fd: p9_fd_create_tcp (10587): problem connecting socket to 127.0.0.1 [ 2550.062988] loop2: detected capacity change from 0 to 215922 [ 2550.081230] loop5: detected capacity change from 0 to 264192 [ 2550.100976] loop2: detected capacity change from 0 to 215922 [ 2550.139271] loop4: detected capacity change from 0 to 215922 21:29:18 executing program 7: syz_read_part_table(0x696e5b3, 0xf00, 0x0) 21:29:18 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:29:18 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481258, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:18 executing program 5: syz_read_part_table(0x0, 0x2, 0x0) 21:29:18 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048122b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:18 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0x3, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r2, 0xf50f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3e}}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x261}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/ldiscs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYRES64=r6, @ANYRESDEC=r1, @ANYRES16, @ANYBLOB="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"], 0x18, 0x20400c4}, 0x40000) openat(r7, &(0x7f00000000c0)='./file0\x00', 0x343a00, 0x10) sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5, @ANYBLOB="b77c0a7ce6d560725a2b550000ea5c15d1e58ecb5b3bda299299d4546d5a42e075ce4986eff23e4ce0315de62d805d1c3958f06d576fcc5753d32f4d6d9434adb8a8d5aaaee94aa8070864f1a5030022e6b458567efcebfc81f1b5538d647a5c31b504655a621963089368e35e409da706ff", @ANYRES16, @ANYRESDEC=r0], 0x18}, 0x0) ioctl$TUNSETLINK(r5, 0x400454cd, 0x7) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:18 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x7a, 0x0) 21:29:18 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f00000000c0)=0x2) syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18}, 0x0) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f00000003c0)=[r7], 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:18 executing program 7: syz_read_part_table(0x696e5b3, 0x1100, 0x0) [ 2575.143346] 9pnet_fd: p9_fd_create_tcp (10616): problem connecting socket to 127.0.0.1 [ 2575.151008] loop2: detected capacity change from 0 to 215922 [ 2575.199047] loop2: detected capacity change from 0 to 215922 [ 2575.212928] loop4: detected capacity change from 0 to 215922 21:29:18 executing program 5: syz_read_part_table(0x0, 0x3, 0x0) 21:29:18 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xa80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x10}, 0x0, 0xfffffffffffbffff, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000003c0)={@multicast2, @broadcast}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:18 executing program 7: syz_read_part_table(0x696e5b3, 0x1200, 0x0) 21:29:18 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x90, 0x0) 21:29:18 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048122d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:18 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481263, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2575.373832] loop4: detected capacity change from 0 to 215922 [ 2575.391207] loop2: detected capacity change from 0 to 215922 21:29:34 executing program 5: syz_read_part_table(0x0, 0x4, 0x0) 21:29:34 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:29:34 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048122e, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:34 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) fcntl$getown(r0, 0x9) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000000c0)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:34 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000280)={0xd, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x0, 0xee00}}, './file0\x00'}) accept4$unix(r4, &(0x7f00000003c0), &(0x7f0000000440)=0x6e, 0x800) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:34 executing program 7: syz_read_part_table(0x696e5b3, 0x2000, 0x0) 21:29:34 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481264, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:34 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xf0, 0x0) [ 2591.031802] 9pnet_fd: p9_fd_create_tcp (10666): problem connecting socket to 127.0.0.1 [ 2591.049909] loop4: detected capacity change from 0 to 215922 [ 2591.061299] loop2: detected capacity change from 0 to 215922 21:29:34 executing program 5: syz_read_part_table(0x0, 0x5, 0x0) 21:29:34 executing program 7: syz_read_part_table(0x696e5b3, 0x3f00, 0x0) 21:29:34 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x0, @private=0xa010102}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2591.114748] loop2: detected capacity change from 0 to 215922 21:29:34 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfe, 0x0) 21:29:34 executing program 7: syz_read_part_table(0x696e5b3, 0x4000, 0x0) 21:29:34 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481269, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:34 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048122f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2591.317187] loop4: detected capacity change from 0 to 215922 [ 2591.341104] loop4: detected capacity change from 0 to 215922 [ 2591.371754] loop2: detected capacity change from 0 to 215922 [ 2591.393009] loop2: detected capacity change from 0 to 215922 21:29:52 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) write(r1, &(0x7f0000000400)="d81d5a60d3be24b4150e96d04fa90dc84a041545c0ee75782930e98ad72160263ab4be2b42d426b0afe6517385afd5712281d580c41cdc74f8959cf9a93637d5810344bb89f84f5228991dbafdc4b01cd5ed7a901390ea5c8ee3b7b55fa5fb4d4d1d6f5330e41de6751dd2d8159a79d9c189b507553950e143304303d50334381fca328a0b37435731d26c9034e653566084eb0fb270f3528402bb8731e1d3e72e903bb0b7096c7f25ba6048129e5be67ddf420313bfb511e5986d4a273e980fe48ac9dbff80ae4590b3", 0xca) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) r4 = signalfd4(r3, &(0x7f00000000c0)={[0x6]}, 0x8, 0x80000) ioctl$CDROMREADTOCHDR(r4, 0x5305, &(0x7f00000003c0)={0x4, 0x81}) chdir(&(0x7f0000000500)='./file0\x00') 21:29:52 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x300, 0x0) 21:29:52 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481230, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:52 executing program 5: syz_read_part_table(0x0, 0x6, 0x0) 21:29:52 executing program 7: syz_read_part_table(0x696e5b3, 0x4800, 0x0) 21:29:52 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048126c, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:52 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/9, 0x9) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14400000000000000100000801000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) ioctl$FIBMAP(r3, 0x1, &(0x7f00000003c0)=0x7) 21:29:52 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) [ 2608.445345] loop4: detected capacity change from 0 to 215922 [ 2608.457776] 9pnet_fd: p9_fd_create_tcp (10721): problem connecting socket to 127.0.0.1 21:29:52 executing program 5: syz_read_part_table(0x0, 0x7, 0x0) [ 2608.498905] loop2: detected capacity change from 0 to 215922 21:29:52 executing program 7: syz_read_part_table(0x696e5b3, 0x4c00, 0x0) 21:29:52 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x7ff, 0x4) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB="00000000c4a4689ab3d69df562e1ecd7d22106391d54c7f23182be28ef382e51efbcf431d2216db499222cfd73b49cce2056060575e1f6f3b0cac5602628d0482c149405b18ec81b3690dba210a877e2a26bd0fc14216f3194f06d9cdef76d2643006962a3fd2c14d98591735b9b963bd625e4d8ab76db5d1480a05994cf81b1c9f2fe74140cdfb6f8042bec7cd5dd449c6fc681773fdac668b127"], 0x18}, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f00000003c0)={{0x2, 0x1}, {0x5, 0x20}, 0x5c, 0x7, 0xb6}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:52 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x220000, 0x68) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2608.577576] loop2: detected capacity change from 0 to 215922 21:29:52 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x500, 0x0) 21:29:52 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048126f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:29:52 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481258, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2608.695189] loop4: detected capacity change from 0 to 215922 21:29:52 executing program 5: syz_read_part_table(0x0, 0x8, 0x0) [ 2608.788856] loop2: detected capacity change from 0 to 215922 [ 2608.848082] loop2: detected capacity change from 0 to 215922 21:30:07 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:30:07 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481263, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:07 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481270, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:07 executing program 7: syz_read_part_table(0x696e5b3, 0x5500, 0x0) 21:30:07 executing program 5: syz_read_part_table(0x0, 0x10, 0x0) 21:30:07 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x4, 0x0, 0x0, 0x1080000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x9e27eb92612e4a93, 0x0) fcntl$lock(r2, 0x7, &(0x7f00000003c0)={0x1, 0x2, 0xffffffffffffff1a, 0x1f}) r3 = clone3(&(0x7f0000004c00)={0xc0000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) capset(&(0x7f0000000000)={0x20080522, r3}, &(0x7f0000000040)={0xfffffff9, 0xe385, 0x200, 0x9, 0x80000, 0x7f}) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$KDDELIO(r2, 0x4b35, 0x4) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:07 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x600, 0x0) 21:30:07 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) fcntl$setpipe(r0, 0x407, 0x5) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000600), 0x6, 0x402) readv(r4, &(0x7f0000000800)=[{&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000700)=""/23, 0x17}, {&(0x7f0000000740)=""/133, 0x85}], 0x3) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000540)=ANY=[@ANYBLOB="015fb00c99d76124bb000000", @ANYRES32=r2, @ANYBLOB="ff070000000000002e2f66696c653000"]) write$P9_RREAD(r5, &(0x7f0000000840)=ANY=[@ANYBLOB="3b000000750700300000005a9fbdf6d6560ad6d93e463279459a2b0af27a356aee100690a508dcee0a1eddf509f3089228fd97fef68671d21ff650e267aeff5c3efbca6f561904113b0a70"], 0x3b) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000580)={{}, 0x9, 0x7, 0x9ff}) syz_read_part_table(0x696e5b3, 0x0, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r6, 0x80106720, &(0x7f0000000500)={0x1, &(0x7f00000004c0)=[{0x2, 0xd3, &(0x7f00000003c0)="b3c9edf56a3cf8d38911a462bd0922fb13e0b3c7c4521769fae32953a3a84e8e32887ed3f0e3c4e7650335268d5aef6cb48d082b72cdb0996227e7ee9befdb058fe0f1e528907b0d31d68cdb8b3aafcc742c6115df1d01aedbc145d5c5308f7c768728134f2d7eb7703b98d745f8013e36c6b4ab0f23948733d587be4ae2aed16880a25af9b6446669ac84110166ae56cadf0255af76f09826f49915bdb485fa894a6a415cc5348b66b2c1baefc50fe3a315a1f38383d62889b4451f078308735b2c43b094088b58f7793f73e2d2b04c65180e", 0x1}]}) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f00000005c0)=0x1000, 0x4) [ 2623.930285] 9pnet_fd: p9_fd_create_tcp (10758): problem connecting socket to 127.0.0.1 [ 2623.933319] loop2: detected capacity change from 0 to 215922 21:30:07 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x81, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) gettid() r3 = openat$cgroup_ro(r0, &(0x7f0000000400)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) r4 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x5, 0x40000) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000003c0)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2623.973061] loop2: detected capacity change from 0 to 215922 21:30:07 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481264, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2624.067274] loop4: detected capacity change from 0 to 215922 21:30:07 executing program 7: syz_read_part_table(0x696e5b3, 0x6800, 0x0) 21:30:07 executing program 5: syz_read_part_table(0x0, 0x12, 0x0) 21:30:07 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2624.231379] loop2: detected capacity change from 0 to 215922 21:30:07 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x700, 0x0) [ 2624.438791] loop2: detected capacity change from 0 to 215922 21:30:23 executing program 5: syz_read_part_table(0x0, 0x48, 0x0) 21:30:23 executing program 7: syz_read_part_table(0x696e5b3, 0x696f, 0x0) 21:30:23 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:30:23 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r3 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000006c0)={{}, r6, 0x0, @inherit={0x60, &(0x7f0000000640)=ANY=[@ANYBLOB="030000000000000000000000000000000000e0000000000000000000000000000700000000000000000000000000000000000000000000009a090000000000000600000000000000ff00"/88]}, @subvolid=0x1}) ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f0000001500)={0x3, 0x4, @start={0x0, 0x0, "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", "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"}, [0x400, 0x4, 0x7, 0x194, 0xbd47, 0xad, 0x4, 0xfffffffffffffffe, 0x7, 0x80000001, 0x7f, 0x983, 0x800, 0x9, 0x8, 0x400, 0x7, 0xfff, 0x9, 0xc00000, 0x0, 0x3, 0x401, 0x8001, 0x5, 0x8, 0x1, 0x8000, 0x6, 0x6, 0x4, 0x1, 0x83, 0x4ae43bce, 0x8, 0x5, 0x100000001, 0x1000000000000000, 0x8, 0x80000000, 0x800, 0x7, 0x7f, 0x4, 0x0, 0x7, 0x6, 0x1, 0x2, 0x3, 0x4, 0xffffffffffffff7c, 0x9, 0x0, 0xf6, 0x10001, 0x7, 0x7fff, 0x8000, 0x6, 0x7, 0x100000001, 0x4, 0x8000]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000001f40)={{r3}, r6, 0x18, @inherit={0x68, &(0x7f00000003c0)={0x1, 0x4, 0x20, 0xa6a47f3, {0x1a, 0x0, 0x54f3bc5a, 0xc77, 0x10001}, [0x1, 0x401, 0x3, 0xff]}}, @devid=r7}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0)) 21:30:23 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481269, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:23 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:23 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x900, 0x0) 21:30:23 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481275, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2639.949103] loop4: detected capacity change from 0 to 215922 [ 2639.949942] 9pnet_fd: p9_fd_create_tcp (10818): problem connecting socket to 127.0.0.1 21:30:23 executing program 5: syz_read_part_table(0x0, 0x4c, 0x0) 21:30:23 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:30:23 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xa00, 0x0) [ 2640.041350] loop2: detected capacity change from 0 to 215922 21:30:23 executing program 5: syz_read_part_table(0x0, 0x68, 0x0) 21:30:23 executing program 7: syz_read_part_table(0x696e5b3, 0x6c00, 0x0) [ 2640.113936] loop2: detected capacity change from 0 to 215922 21:30:23 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = fspick(r0, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r4, 0x4008f50a, &(0x7f00000003c0)={0x8001, 0x81}) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0) r7 = accept$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000004c0)=0x14) sendfile(r6, r7, &(0x7f0000000500)=0x6, 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000400)={'wg1\x00', 0x0}) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000440)={@dev={0xac, 0x14, 0x14, 0x2c}, @multicast1, r8}, 0xc) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:23 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481278, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2640.168394] 9pnet_fd: p9_fd_create_tcp (10835): problem connecting socket to 127.0.0.1 21:30:23 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) r2 = pidfd_getfd(r0, r1, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000400)=0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000001500)={{r2}, r3, 0x6, @inherit={0x50, &(0x7f0000000440)={0x0, 0x1, 0x1, 0xfffffffffffffffb, {0x17, 0x7fffffff, 0x1, 0x7, 0x80}, [0x5]}}, @name="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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f00000004c0), 0x3, 0x10000) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000002500)={{r6}, 0x0, 0x8, @inherit={0x70, &(0x7f0000000500)={0x1, 0x5, 0x9, 0xffffffff00000000, {0xd07a868f3837e7da, 0x6, 0x6, 0x200, 0xffffffffffffff24}, [0x400, 0x1, 0x80000001, 0x81, 0x200]}}, @name="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"}) sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) ioctl$KDGKBMETA(r5, 0x4b62, &(0x7f00000000c0)) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa0a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:23 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048126c, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:23 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xd00, 0x0) 21:30:23 executing program 7: syz_read_part_table(0x696e5b3, 0x6f69, 0x0) [ 2640.277878] loop4: detected capacity change from 0 to 215922 [ 2640.288201] loop2: detected capacity change from 0 to 215922 [ 2640.333032] loop2: detected capacity change from 0 to 215922 21:30:23 executing program 5: syz_read_part_table(0x0, 0x6c, 0x0) 21:30:23 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) [ 2640.431701] 9pnet_fd: p9_fd_create_tcp (10862): problem connecting socket to 127.0.0.1 21:30:40 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:30:40 executing program 5: syz_read_part_table(0x0, 0x74, 0x0) 21:30:40 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:40 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048126f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:40 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xf00, 0x0) 21:30:40 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048c2d6, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:40 executing program 7: syz_read_part_table(0x696e5b3, 0x7400, 0x0) 21:30:41 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xf6, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x40000, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r2, 0xc0109414, &(0x7f0000004c80)=ANY=[@ANYBLOB="900a00000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009f23c8962cb60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000078420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002e5b40f0b6dead00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002280a37b2061c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e754948a9b04d8e8c3883479592a787f045e9f32fd736c555bfbb91d192e62f34264cd22d77845e10bcbbc9344fdc2b611aca4afaa46dc2ec614b48972afc943686a5f0e956edacb2c8574b0459f2275b6adf7d4a510d1235d3e57cde67b64df4f98db5917ffc2fce42da5d2f80b7209bf99d0c2efb28cd9b0428e60a7b689d4c974705600c8f6a66d543a470056d6db1944045cd19a1de9773521063f9517d126a563cabcbd04d47175b30c204ade9ae7a180c0ccf778fbe5364599f7482b05d3ce64c21ed60ae167e0c0997c199038ba273e41384217ded263aff65c448747abf7eb53f4b0201ffbae4b6c"]) socket$inet_udp(0x2, 0x2, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f0000000540)=0x4f) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) r3 = clone3(&(0x7f0000004c00)={0xc0000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)={0xfffffffb, 0xe385, 0x200, 0x9, 0x80000, 0x7f}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x4, 0x80, 0xfe, 0x1f, 0x0, 0x41, 0x4060, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000440), 0x8}, 0x1400, 0x1, 0x1, 0x6, 0x4, 0x8001, 0xeb60, 0x0, 0x8, 0x0, 0x4}, r3, 0x10, 0xffffffffffffffff, 0x9) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mknodat$loop(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x6000, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:30:41 executing program 5: syz_read_part_table(0x0, 0x7a, 0x0) 21:30:41 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) fchdir(r1) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2657.466036] 9pnet_fd: p9_fd_create_tcp (10878): problem connecting socket to 127.0.0.1 [ 2657.469009] loop2: detected capacity change from 0 to 215922 21:30:41 executing program 7: syz_read_part_table(0x696e5b3, 0x7a00, 0x0) [ 2657.492923] loop2: detected capacity change from 0 to 215922 [ 2657.519134] loop4: detected capacity change from 0 to 215922 21:30:41 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x1100, 0x0) 21:30:41 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481270, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:41 executing program 7: syz_read_part_table(0x696e5b3, 0x9000, 0x0) 21:30:41 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:30:41 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2657.670343] loop2: detected capacity change from 0 to 215922 [ 2657.674768] 9pnet_fd: p9_fd_create_tcp (10907): problem connecting socket to 127.0.0.1 [ 2657.700864] loop2: detected capacity change from 0 to 215922 21:30:58 executing program 5: syz_read_part_table(0x0, 0xf0, 0x0) 21:30:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$nl_audit(0x10, 0x3, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000980)='net/rfcomm\x00') ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x207) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, 0x6, &(0x7f0000000800)=[{&(0x7f0000000480)="c9489f7cd65d1d500683dd", 0xb, 0x8}, {&(0x7f00000004c0)="27803e4221e59758959c2d036c9e29af8f120fa5febdba7fcf3f0e527405f95696606fc4af506f1bdb678db1f257529711307313a298ee13c98344d5a5938e3416afd56dc4aa5ef4b8ca563f8253b280611f6816b40d0a6161a1718d2172527b7d84bb5eb284ec16b14028a3d8e64de31cfc816a63428a2209df9bf93d78a449dfb2c8f23f9aa9d07663da2a136fded32b5ac8aa9f", 0x95, 0x2}, {&(0x7f0000000580)="d9a816d987671ae3f68412401eb88167782685022b47de6a31d614cf4c1bf8ace0115748af4bd08d301d36e28516ad15675aa2783d8110b496b5fe33b756e2ca70fab636f1c0b34fbad63ff1622c08f620ef0daee64ba5647aff6da8d80242e795c762c3e4f8411a9760def9f16f68492e5e33b8d163fb10e73bf43a66ec933c4b9ff50cad74b4d45a0386e867e77209da4ed729db3abc", 0x97, 0x8}, {&(0x7f0000000640)="59670bccab4d57794a23c897e88d3f4817c1fc36e3b3ae40573818b2e4cddb60e197ec4f39d18b49d47502fd7aedef139864e64addc42ea67c74ef8b64271a19ea76d25f6990c662125b668d11f906dec94bcbf319055ca8a1fe8ba5711ea9017c3008bd136ceef2c71317aa70020a686b5df7ac36ef10164d5ccfa108e299f1c6a506744fbce3", 0x87, 0x20}, {&(0x7f0000000700)="c484aa1337201ee55b9ce200e30586a2da0ca61733b33e601c0695521dbd42215a10e2b9233578f859b89acd249d3c3fc6921e20b3dabbe5638201555a6ce252aef1afad2127c0aeef10de8756c698058ae1063fda8f8ba2540036b3064990201d6e3cf2ee4e7ac03c58b00b125ea4a1db8de01507a27ef1cb1354b1de", 0x7d, 0x40}, {&(0x7f0000000780)="c92dd76774cf1bc507577cfc5f68cc0a34ec83781daf0a796909634d3515ffc9e49beed332bd7c492dfe650d69e0a174259e6b2cc55ea73f8fa7cadcce25f67bc03976b4f455a0da7d4b", 0x4a, 0x5}], 0x14011, &(0x7f00000008c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0xc, 0x31, 0x39, 0x25, 0xa842f0b8e49f1559, 0x6d]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x30, 0x30, 0x25, 0x30, 0x70, 0x70]}}, {@huge_advise}, {@huge_never}], [{@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f00000000c0)='/dev/vcsa#\x00', &(0x7f00000003c0)='./file0\x00', r5) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:58 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x1e2a3, 0x0, 0x0, 0x6, 0x1000, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:58 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x1200, 0x0) 21:30:58 executing program 7: syz_read_part_table(0x696e5b3, 0xf000, 0x0) 21:30:58 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:30:58 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481275, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:58 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048d6c2, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2675.361881] loop4: detected capacity change from 0 to 215922 [ 2675.368181] 9pnet_fd: p9_fd_create_tcp (10928): problem connecting socket to 127.0.0.1 [ 2675.374251] loop2: detected capacity change from 0 to 215922 [ 2675.400528] loop2: detected capacity change from 0 to 215922 21:30:59 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x2000, 0x0) 21:30:59 executing program 5: syz_read_part_table(0x0, 0xfe, 0x0) 21:30:59 executing program 7: syz_read_part_table(0x696e5b3, 0xfeff, 0x0) 21:30:59 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481278, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:59 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:30:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x0, 0x80, 0x2, 0x0, 0x0, 0x6, 0x8, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, @perf_config_ext={0xfffffffffffffffb, 0x5}, 0x10c0, 0xa6f, 0x9, 0x2, 0x0, 0x2, 0x43a8, 0x0, 0x6, 0x0, 0x9}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:59 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:30:59 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) recvmsg$unix(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000640)=""/82, 0x52}, {&(0x7f00000006c0)=""/110, 0x6e}], 0x4, &(0x7f0000000780)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}, 0x2042) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f00000003c0)='./file0\x00', 0x4f, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000400), 0x0, 0x7}, {&(0x7f0000000440)="81d497f9430b476ec852c80d3570a0ab5a93209e6d30fd6ab311e97065fd45aeed2b21ac3e986f49d6b8a5e4319f073f5b410a7cafe17021a8f074ffc7e80ed6a879724ef40b5d3f4cdce2e023950cb0a5c2", 0x52, 0x10001}, {0xffffffffffffffff, 0x0, 0x72f}], 0x0, &(0x7f00000008c0)={[{@huge_within_size}, {@huge_advise}, {@uid={'uid', 0x3d, 0xee00}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x6d, 0x38, 0x35, 0x25, 0x37, 0x31]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x2d, 0x25]}}, {@mpol={'mpol', 0x3d, {'local', '=relative', @void}}}, {@size={'size', 0x3d, [0x30, 0x31, 0x30, 0x35, 0x65, 0x67, 0x6b]}}, {@uid={'uid', 0x3d, r3}}], [{@euid_lt={'euid<', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/vcsa#\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, '/dev/vcsa#\x00'}}, {@uid_eq}, {@fsmagic={'fsmagic', 0x3d, 0x80000001}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@seclabel}]}) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2675.569188] loop2: detected capacity change from 0 to 215922 21:30:59 executing program 7: syz_read_part_table(0x696e5b3, 0xff0f, 0x0) [ 2675.598517] 9pnet_fd: p9_fd_create_tcp (10961): problem connecting socket to 127.0.0.1 21:30:59 executing program 5: syz_read_part_table(0x0, 0x300, 0x0) [ 2675.643905] loop4: detected capacity change from 0 to 215922 [ 2675.720723] loop4: detected capacity change from 0 to 215922 21:31:15 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000003c0)={"91bb6da0c3db1f589275eb6cbe66254d", 0x0, 0x0, {0x1000, 0xeb}, {0x6, 0x5}, 0x6, [0x785, 0x800, 0x6, 0x1, 0xb6, 0x80, 0xfffffffffffffff8, 0x1, 0xfffffffffffffff7, 0x4, 0x8, 0x800, 0x35, 0x2, 0x800, 0x6]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000004c0)={"f973008724e9c94bacb4c3f417f51ee9", r5, r6, {0x7e6, 0x100}, {0x2, 0x6}, 0xd6, [0x3, 0x0, 0x40, 0x3, 0xbf85, 0x9, 0x2, 0x7, 0x8, 0x9, 0x2, 0x6c7c, 0x5, 0x7ff, 0x0, 0xc36]}) 21:31:15 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:31:15 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x3f00, 0x0) 21:31:15 executing program 5: syz_read_part_table(0x0, 0x500, 0x0) 21:31:15 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:31:15 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x4, 0xffffffffffffffff, 0x2) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:31:15 executing program 7: syz_read_part_table(0x696e5b3, 0xfffe, 0x0) 21:31:15 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048c2d6, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2692.366733] 9pnet_fd: p9_fd_create_tcp (10991): problem connecting socket to 127.0.0.1 21:31:16 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x4800, 0x0) [ 2692.433357] loop4: detected capacity change from 0 to 215922 21:31:16 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:31:16 executing program 5: syz_read_part_table(0x0, 0x600, 0x0) [ 2692.518191] loop2: detected capacity change from 0 to 215922 [ 2692.545608] loop2: detected capacity change from 0 to 215922 [ 2692.559148] 9pnet_fd: p9_fd_create_tcp (11004): problem connecting socket to 127.0.0.1 21:31:30 executing program 7: syz_read_part_table(0x696e5b3, 0x34b6a, 0x0) 21:31:30 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x4c00, 0x0) 21:31:30 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:31:30 executing program 5: syz_read_part_table(0x0, 0x700, 0x0) 21:31:30 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x5, 0xfb, 0x1f, 0xfa, 0x0, 0xfffffffffffff000, 0x1100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfa, 0x0, @perf_bp={&(0x7f00000000c0)}, 0xa108dba22f17ae0e, 0x8, 0x2, 0x1, 0x8, 0x4, 0xfa87, 0x0, 0x684, 0x0, 0x2}, 0xffffffffffffffff, 0x3, r0, 0x4) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000440)={@multicast2, @dev={0xac, 0x14, 0x14, 0x21}}, 0xc) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:31:30 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r3 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f00000000c0)={0xd, 0x8}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000005040)={{0x1, 0x1, 0x18, r0, {0x0, 0xffffffffffffffff}}, './file0\x00'}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @broadcast}, 0x24}) r5 = syz_mount_image$iso9660(&(0x7f0000003a40), &(0x7f00000003c0)='./file0\x00', 0xfff, 0x6, &(0x7f0000003680)=[{&(0x7f0000000400)="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", 0x1000, 0x3f}, {&(0x7f0000001500)="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", 0x1000, 0x52fb}, {&(0x7f0000001400)="c4028709af9cb54a44a9500b8c3b0e06ed11a0cbba07f924f8f5d7fc94917f1e1841315c6e58182a8c2308b9b924cb90391e95f7cb5cc25f8669490bb031d619a5ea7dcae864d990c4db32e4014d3a9ab6b77d43765d41394107c0cb880f6014cb4d3fd81598c56506e56c9c62c7c0281742221cfefc458c01fdbd", 0x7b, 0x4}, {&(0x7f0000002500)="f53709734e5f4cb0d5dab44c007c53b793bd86d7dc9f022fdb59c5fba1e02b5a87c8e795d8443961098afec431157b38d247e10e62d7008e74d1b949843725f05b7929754bf71fd39ab8a5b6ef3d0e085602619d30eb12d0b39f2d2160084613", 0x60, 0x3}, {&(0x7f0000002580)="a3f160f3d6eb139c61505ef89e5cef6da450145ed8bd604fc294c9a90afe8c3df77f2faf94a42ba5dd8a538af18b86c0b32c25f65da89baf1f2c231534fcef38e4783b85a37da39e454472e3dfaf1c9d4c98455fb57c8d8f3158ecfb80878d36e206c133d6604d68224a9a51b1782bd399e29670fd768e42ae6f90ced43ebb73dbf6184e08045c240085fec57aa8b6f934432aeeb2960456a0c2eb95e85eeb968647d02b3a8bd6cef8b606c305c802a1ce92eca9cc75072d9e062c47b2900e7b34f1822a95d652f8f860300edb912fd1c3e61b6f71dfc26798220c51a27de16042f269ffcb0904687f845aa295e8be39b512dd40", 0xf4, 0x9}, {&(0x7f0000002680)="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", 0x1000, 0x101}], 0x2, &(0x7f0000003740)={[{@check_strict}, {@hide}, {@unhide}, {@hide}, {@block={'block', 0x3d, 0xc00}}], [{@fsuuid={'fsuuid', 0x3d, {[0x66, 0x63, 0x30, 0x33, 0x38, 0x5, 0x33, 0x62], 0x2d, [0x38, 0x39, 0x37, 0x36], 0x2d, [0x66, 0x62, 0x64, 0x34], 0x2d, [0x36, 0x38, 0x31, 0x36], 0x2d, [0x64, 0x61, 0x65, 0x32, 0x6, 0x33, 0x62, 0x37]}}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@euid_lt}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@appraise}, {@measure}]}) ioctl$VFAT_IOCTL_READDIR_SHORT(r5, 0x82307202, &(0x7f0000003800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) sendfile(r3, r0, &(0x7f0000005000)=0x7fffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18}, 0x0) sendmsg$sock(r7, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003a80)="23acf3046d3fd8d77a3249c746e181a21c21028d59563101eb2aece7e779a70d73d06b7d965d21a2f6080c270a3035f4c7d0b3aa0a67027a45b5627b578bd9d7f83ee0dc91e5910de9465fb9041ca2b19e85b32b8684d041f24ebdd740e50e7edededca012c13b3e90e0726604c295a576df68b76ce8e36a16c56944b211fc5b96089bd29cbb8d72a6d4dbb8fa3a159b48328556c0fafcc823262575bb0524042092e4", 0xa3}, {&(0x7f0000003b40)="64b2dbfbe9b768635ba17ff88b56b1bec534195bbc7d4a498d1889750a669a1b1f4ae0edce3c191f1c2ed5d7c66963e9c1b4855666439f32ee52ce364bcb97bd3afd1cb70baa721ac6ec9270a5a1dec75352893a89f9dfc76e7c505f02e1b4cd4a2caeac2032631dd1f00091f0f2cc02869bb96bc0a09dfca9852727087875726914646d2cf7fb", 0x87}, {&(0x7f0000003c00)="b11b086b31b34119dd4dd1703dc950031aaea7f5793550874b6f6349e3058187974d497cb8a9b7ea80962289ffa8f674e04ef094499ec17a3d44567e00deb6e7a7c343d23cde0cd7fc24e874079902", 0x4f}, {&(0x7f0000003c80)="77ce4270c3d94cb306dfa5b6023501", 0xf}, {&(0x7f0000003cc0)="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", 0x1000}, {&(0x7f0000004cc0)="91f43c4ce9f51de4b566bae8a3e5cf6d4bbef8be5841e61556de5ec7e7d110aec5d3446bf6ee9d429c1fa8ecdfa83d7f8f3c3c20b4293a2ca729f2480f72d2529e28f1d6380180a1f30d79bfc58d38b5ae250bfa4a4401cc3fdbd00af4b5ef601bae91a3af5f9786d58d262316cd908fc61b8486d4793c26caeb520d4fe25591bfa660f8045cdc4a6c83dad793c4fcf5445082af9d77cbe74b5d6a2a83783c9ce38a959ec01c3134a087f7e3b5097c8c688c80093cea344ca5d442e4067ae86d47b083d18b323b52deab859f3a85db52d6a25facece86eb40deeb777a53d345136", 0xe1}, {&(0x7f0000004dc0)="ff16b2ae4b2702cf55081036814ca38272b3eee0484362b678d91423c967b66fb247d2c2b0657149c38770034248fa3360bd24f1921c556bbc637fc65eb919070d89df", 0x43}, {&(0x7f0000004e40)="6448249b42aa15ecc3907610f20b0e54edb3313d5575315494a103a5ff34120464a9ca01524736e30d08ec5eccf416de807cd96cf7df60168dc2a21140f112f470a34b1b612b4b", 0x47}], 0x8, &(0x7f0000004f40)=[@txtime={{0x18, 0x1, 0x3d, 0x7ff}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x10001}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0x60}, 0x40000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:31:30 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:31:30 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc048d6c2, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2707.373152] loop2: detected capacity change from 0 to 215922 [ 2707.377323] 9pnet_fd: p9_fd_create_tcp (11033): problem connecting socket to 127.0.0.1 21:31:31 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x5500, 0x0) 21:31:31 executing program 7: syz_read_part_table(0x696e5b3, 0x34b71, 0x0) [ 2707.420636] loop2: detected capacity change from 0 to 215922 21:31:31 executing program 5: syz_read_part_table(0x0, 0x1200, 0x0) 21:31:31 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:31:31 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0xf5, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) r3 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x40d}}, './file0\x00'}) recvfrom$inet(r5, &(0x7f00000003c0), 0x0, 0x2000, &(0x7f0000000400)={0x2, 0x4e21, @private=0xa010102}, 0x10) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:31:31 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2707.515558] loop4: detected capacity change from 0 to 215922 21:31:31 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6800, 0x0) 21:31:31 executing program 5: syz_read_part_table(0x0, 0x2000, 0x0) 21:31:31 executing program 7: syz_read_part_table(0x696e5b3, 0x34b72, 0x0) [ 2707.580815] 9pnet_fd: p9_fd_create_tcp (11049): problem connecting socket to 127.0.0.1 21:31:31 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:31:31 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) readahead(r3, 0xb2, 0x2) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2707.640788] loop2: detected capacity change from 0 to 215922 21:31:31 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x696f, 0x0) [ 2707.679717] loop2: detected capacity change from 0 to 215922 [ 2707.683083] blktrace: Concurrent blktraces are not allowed on sg0 [ 2707.701106] loop4: detected capacity change from 0 to 215922 21:31:48 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:31:48 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6c00, 0x0) 21:31:48 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x48, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:31:48 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = socket$inet_udplite(0x2, 0x2, 0x88) open_by_handle_at(r0, &(0x7f00000000c0)=@orangefs_parent={0x28, 0x2, {{"61f6dca788b659ac408990b354ee9cc1"}, {"a3c6189f120e5bba4c12c377ad88196b", 0x5}}}, 0x305000) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 21:31:48 executing program 5: syz_read_part_table(0x0, 0x3f00, 0x0) 21:31:48 executing program 7: syz_read_part_table(0x696e5b3, 0x80000, 0x0) 21:31:48 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:31:48 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth1_vlan\x00'}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2724.580846] 9pnet_fd: p9_fd_create_tcp (11087): problem connecting socket to 127.0.0.1 21:31:48 executing program 5: syz_read_part_table(0x0, 0x4000, 0x0) 21:31:48 executing program 7: syz_read_part_table(0x696e5b3, 0x900000, 0x0) 21:31:48 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6f69, 0x0) [ 2724.653181] loop2: detected capacity change from 0 to 215922 [ 2724.749884] blktrace: Concurrent blktraces are not allowed on sg0 [ 2724.756946] loop2: detected capacity change from 0 to 215922 [ 2724.759192] loop4: detected capacity change from 0 to 215922 21:32:03 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @rand_addr=0x64010102}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x8}}, {0x2, 0x0, @multicast2}, 0x65}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:03 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:03 executing program 5: syz_read_part_table(0x0, 0x4800, 0x0) 21:32:03 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:03 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:32:03 executing program 7: syz_read_part_table(0x696e5b3, 0xf0ffff, 0x0) 21:32:03 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x7400, 0x0) 21:32:03 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2740.098551] 9pnet_fd: p9_fd_create_tcp (11115): problem connecting socket to 127.0.0.1 [ 2740.216647] loop2: detected capacity change from 0 to 215922 [ 2740.267001] blktrace: Concurrent blktraces are not allowed on sg0 [ 2740.270255] blktrace: Concurrent blktraces are not allowed on sg0 [ 2740.276746] loop2: detected capacity change from 0 to 215922 21:32:03 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x83, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2740.330080] loop4: detected capacity change from 0 to 215922 21:32:04 executing program 7: syz_read_part_table(0x696e5b3, 0x1000000, 0x0) 21:32:04 executing program 5: syz_read_part_table(0x0, 0x4c00, 0x0) 21:32:04 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:32:04 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x7a00, 0x0) 21:32:04 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:04 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x9, 0x40, 0x8, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5504, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x200, 0x7, 0xa3, 0x6, 0x9976, 0x4, 0x4, 0x0, 0x7f, 0x0, 0xfffffffffffff801}, 0x0, 0x9, r0, 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0) ioctl$FICLONE(r4, 0x40049409, r6) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r6, 0xc0189372, &(0x7f0000000500)={{0x1, 0x1, 0x18, r2, {0x3}}, './file0\x00'}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xf, 0x7, 0x0, 0x0, 0x0, 0x800, 0x40009, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440), 0x1}, 0x6011, 0x554, 0x9, 0x0, 0x8, 0x8, 0x7, 0x0, 0x4, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r7, 0xa) 21:32:04 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x68, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2740.598600] 9pnet_fd: p9_fd_create_tcp (11148): problem connecting socket to 127.0.0.1 21:32:04 executing program 5: syz_read_part_table(0x0, 0x6800, 0x0) 21:32:04 executing program 7: syz_read_part_table(0x696e5b3, 0x2000000, 0x0) [ 2740.679000] loop2: detected capacity change from 0 to 215922 [ 2740.697607] blktrace: Concurrent blktraces are not allowed on sg0 [ 2740.707079] blktrace: Concurrent blktraces are not allowed on sg0 [ 2740.758641] loop4: detected capacity change from 0 to 215922 [ 2740.856548] loop4: detected capacity change from 0 to 215922 21:32:22 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:32:22 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:22 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x1, 0x5, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:22 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x48, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:22 executing program 5: syz_read_part_table(0x0, 0x6c00, 0x0) 21:32:22 executing program 7: syz_read_part_table(0x696e5b3, 0x3000000, 0x0) 21:32:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) accept$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c) openat2$dir(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x6203, 0x88, 0xa}, 0x18) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) sendmsg$unix(r0, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x840) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c041}, 0x4004000) syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r2 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:22 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x9000, 0x0) [ 2758.680876] 9pnet_fd: p9_fd_create_tcp (11181): problem connecting socket to 127.0.0.1 [ 2758.690630] loop2: detected capacity change from 0 to 215922 21:32:22 executing program 7: syz_read_part_table(0x696e5b3, 0x4000000, 0x0) 21:32:22 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xf000, 0x0) 21:32:22 executing program 5: syz_read_part_table(0x0, 0x7400, 0x0) [ 2758.804067] loop4: detected capacity change from 0 to 215922 [ 2758.841859] blktrace: Concurrent blktraces are not allowed on sg0 [ 2758.848739] loop2: detected capacity change from 0 to 215922 [ 2758.890757] loop4: detected capacity change from 0 to 215922 21:32:38 executing program 5: syz_read_part_table(0x0, 0x7a00, 0x0) 21:32:38 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x100, 0x3, 0xfffffffffffffffc}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000005c0)={{r2}, 0x3, 0x401, 0x3}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x400000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/74}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x40581, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000540)={@private, @private}, &(0x7f0000000580)=0xc) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f00000004c0)={0x1, 0x40000000, 0x0, {0x173b, 0x7}, 0x6, 0x8}) 21:32:38 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:32:38 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x74, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:38 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = clone3(&(0x7f0000004c00)={0xc0000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) capset(&(0x7f0000000000)={0x20080522, r2}, &(0x7f0000000040)={0xfffffff9, 0xe385, 0x200, 0x9, 0x80000, 0x7f}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0xfffffffffffffffa}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:38 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfeff, 0x0) 21:32:38 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:38 executing program 7: syz_read_part_table(0x696e5b3, 0x5000000, 0x0) [ 2774.509966] 9pnet_fd: p9_fd_create_tcp (11206): problem connecting socket to 127.0.0.1 21:32:38 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xff0f, 0x0) 21:32:38 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = inotify_init() fstat(r1, &(0x7f00000003c0)) r2 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r4 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_complete(0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x221}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000440)=0x2, 0x4) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000000c0)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:38 executing program 7: syz_read_part_table(0x696e5b3, 0x6000000, 0x0) 21:32:38 executing program 5: syz_read_part_table(0x0, 0xf000, 0x0) [ 2774.632037] blktrace: Concurrent blktraces are not allowed on sg0 [ 2774.652964] loop2: detected capacity change from 0 to 215922 [ 2774.661989] loop4: detected capacity change from 0 to 215922 [ 2774.699104] loop2: detected capacity change from 0 to 215922 21:32:38 executing program 7: syz_read_part_table(0x696e5b3, 0x7000000, 0x0) 21:32:38 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r3, {0x401}}, '.\x00'}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, &(0x7f00000000c0)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:38 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xfffe, 0x0) 21:32:38 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:38 executing program 5: syz_read_part_table(0x0, 0xfeff, 0x0) 21:32:38 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x68, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2774.901816] loop2: detected capacity change from 0 to 215922 [ 2774.949786] blktrace: Concurrent blktraces are not allowed on sg0 [ 2774.969797] loop2: detected capacity change from 0 to 215922 [ 2774.979010] loop4: detected capacity change from 0 to 215922 [ 2775.076562] loop4: detected capacity change from 0 to 215922 21:32:54 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xf0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:54 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:54 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x1f, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:54 executing program 7: syz_read_part_table(0x696e5b3, 0x8000000, 0x0) 21:32:54 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x34b6a, 0x0) 21:32:54 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:54 executing program 5: syz_read_part_table(0x0, 0xfffe, 0x0) 21:32:54 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) [ 2790.757259] 9pnet_fd: p9_fd_create_tcp (11276): problem connecting socket to 127.0.0.1 21:32:54 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) r3 = eventfd2(0x3f, 0x800) ioctl$int_in(r3, 0x5452, &(0x7f00000000c0)=0x7) 21:32:54 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x34b71, 0x0) [ 2790.798256] blktrace: Concurrent blktraces are not allowed on sg0 [ 2790.801469] loop2: detected capacity change from 0 to 215922 [ 2790.831820] loop4: detected capacity change from 0 to 215922 [ 2790.838074] loop2: detected capacity change from 0 to 215922 21:32:54 executing program 5: syz_read_part_table(0x0, 0x80000, 0x0) 21:32:54 executing program 7: syz_read_part_table(0x696e5b3, 0x9000000, 0x0) 21:32:54 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e23, @dev}, {0x2, 0x0, @dev}, {0x2, 0x4e20, @remote}, 0x24}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000440)=ANY=[@ANYBLOB="020000000100000018000000", @ANYRES32=r0, @ANYBLOB="bd2b0000000000002e2f66696c653000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0xff, 0x2, 0x1, 0x82, 0x0, 0x9, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f00000000c0), 0x5}, 0x8800, 0x20, 0xffffffff, 0x2, 0x2, 0x4, 0x4, 0x0, 0x2, 0x0, 0x401}, 0x0, 0xb, r4, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0) openat$cgroup_int(r6, &(0x7f0000000480)='io.latency\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2, 0xf9, 0x40, 0x14, 0x0, 0x81, 0x1020, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000004c0), 0xb}, 0x108, 0x0, 0x1f, 0x9, 0x6, 0x7, 0xfff, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x1, r0, 0xa) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:54 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa00, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:54 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x74, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:54 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x34b72, 0x0) 21:32:54 executing program 5: syz_read_part_table(0x0, 0x400000, 0x0) 21:32:54 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) readahead(r0, 0x4a5e8000000, 0xc1b) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r4, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r7, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r4, 0x100, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x1, 0x51}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000000) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:32:54 executing program 7: syz_read_part_table(0x696e5b3, 0xa000000, 0x0) [ 2791.089040] loop4: detected capacity change from 0 to 215922 21:32:54 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x80000, 0x0) [ 2791.128240] blktrace: Concurrent blktraces are not allowed on sg0 [ 2791.136342] loop2: detected capacity change from 0 to 215922 21:32:54 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000448bd70000800df25200000000c009900e34efe00190000000aeab0a08ae9a67712dc5aaecf6515a1a57e083482723014f2f588fa906e713e83846c74a30c429ff2c23fa0f71dbbeaf7aceedc52e35110899f65e836c2f1958a5e503e16ba63e04978e0a20a6fb83ff3688d21a676d36b04b4702e9ccc2cdde1c45803a44290f3ed28928b1baf240d436b5741aeec37071b3e86"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000004) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'ip6tnl0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0xcf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2791.247831] loop2: detected capacity change from 0 to 215922 21:33:12 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3f00, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:12 executing program 7: syz_read_part_table(0x696e5b3, 0xd000000, 0x0) 21:33:12 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000101000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) openat(r2, &(0x7f00000003c0)='./file0\x00', 0x145000, 0x28) 21:33:12 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x6, 0x2b0902) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, 0x3f9, 0x100, 0x70bd2a, 0x25dfdbfc, {0x1}, ["", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x1000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @rand_addr=0x64010100}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, r0, 0x2) ioctl$int_in(r5, 0x5421, &(0x7f0000000200)=0x9df) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:12 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x900000, 0x0) 21:33:12 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:12 executing program 5: syz_read_part_table(0x0, 0xf0ffff, 0x0) 21:33:12 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:33:12 executing program 5: syz_read_part_table(0x0, 0x1000000, 0x0) [ 2808.500761] blktrace: Concurrent blktraces are not allowed on sg0 [ 2808.506288] blktrace: Concurrent blktraces are not allowed on sg0 [ 2808.509711] loop2: detected capacity change from 0 to 215922 [ 2808.529063] 9pnet_fd: p9_fd_create_tcp (11358): problem connecting socket to 127.0.0.1 [ 2808.539987] loop4: detected capacity change from 0 to 215922 21:33:12 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lstat(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r4, 0x0) mount$cgroup(0x0, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300), 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB='n,smackfsh#\x00,rootcontexter>\x00'/41, @ANYRESDEC=r4, @ANYBLOB="2c024f470d616973652c687a73682c00"]) creat(0x0, 0x120) r5 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) sendfile(r5, r2, &(0x7f0000000000)=0x200, 0x0) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f0000000100)) r6 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) ioctl$SCSI_IOCTL_SYNC(r6, 0x4) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 21:33:12 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@private0, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f00000003c0)='./file0\x00', 0x9, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000400)="0a7b9770c187ef6424d36145d012c4c6a3cfc023a07005f04b251bdac223451839c76af345e533eb67da28a1f94beaf7cd31a7310037a3c798e45b631a2df5af4948416cfc4a4c2aad9a7bbd2a6c0f2c946ea8b4cc2d6e09922986178e457867cedb9b867f8759fa9e0e7b5c7c32227c370c1f4d32319797996180ec5616700a9e7eeac437ebd04d8b31f6a83bfe10e4ca164611471c07a7", 0x98, 0x100000001}, {&(0x7f00000004c0)="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", 0xfa, 0x7}], 0x60040, &(0x7f0000000740)={[], [{@euid_gt={'euid>', r3}}, {@fowner_gt={'fowner>', r4}}]}) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18}, 0x0) bind$inet6(r7, &(0x7f0000000780)={0xa, 0x4e21, 0x1e7d, @rand_addr=' \x01\x00', 0x1ff}, 0x1c) 21:33:12 executing program 7: syz_read_part_table(0x696e5b3, 0xf000000, 0x0) [ 2808.611228] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 2808.614796] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 2808.686656] loop4: detected capacity change from 0 to 215922 [ 2808.741775] loop2: detected capacity change from 0 to 215922 21:33:29 executing program 5: syz_read_part_table(0x0, 0x2000000, 0x0) 21:33:29 executing program 7: syz_read_part_table(0x696e5b3, 0x11000000, 0x0) 21:33:29 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:33:29 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xf0, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:29 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1400000000000a0000000001000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x2801, 0x48) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:29 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4800, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:29 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xb}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:29 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xf0ffff, 0x0) [ 2826.394133] 9pnet_fd: p9_fd_create_tcp (11386): problem connecting socket to 127.0.0.1 [ 2826.422601] loop2: detected capacity change from 0 to 215922 21:33:30 executing program 5: syz_read_part_table(0x0, 0x3000000, 0x0) 21:33:30 executing program 7: syz_read_part_table(0x696e5b3, 0x12000000, 0x0) 21:33:30 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x1000000, 0x0) 21:33:30 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f00000000c0)={0x0, 0x0, 0x9, 0x11, 0x55, &(0x7f00000003c0)="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"}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2826.484535] loop4: detected capacity change from 0 to 215922 [ 2826.502782] blktrace: Concurrent blktraces are not allowed on sg0 21:33:30 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$CDROM_SET_OPTIONS(r0, 0x5320, 0xa) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f00000000c0)={0x2, 0x1, 0xc}) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2826.539691] loop2: detected capacity change from 0 to 215922 21:33:30 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x2000000, 0x0) 21:33:30 executing program 7: syz_read_part_table(0x696e5b3, 0x20000000, 0x0) 21:33:30 executing program 5: syz_read_part_table(0x0, 0x4000000, 0x0) 21:33:30 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa00, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:30 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x460000) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f0000000480)={{r0}, 0x0, 0x10, @inherit={0x98, &(0x7f00000003c0)={0x0, 0xa, 0x7, 0x800, {0x2e, 0x2ce8, 0x7, 0x1ffe00, 0x6}, [0x1, 0x1, 0x1000, 0x80000000, 0x518e, 0x3ff, 0x8, 0x6, 0xc2c, 0xf0]}}, @name="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"}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2826.808767] loop2: detected capacity change from 0 to 215922 [ 2826.877965] blktrace: Concurrent blktraces are not allowed on sg0 [ 2826.879843] loop2: detected capacity change from 0 to 215922 21:33:46 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:33:46 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x1091) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:46 executing program 5: syz_read_part_table(0x0, 0x5000000, 0x0) 21:33:46 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c00, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:46 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x3000000, 0x0) 21:33:46 executing program 7: syz_read_part_table(0x696e5b3, 0x2ccf95a6, 0x0) 21:33:46 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0xffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:33:46 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3f00, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2842.699571] blktrace: Concurrent blktraces are not allowed on sg0 [ 2842.750100] 9pnet_fd: p9_fd_create_tcp (11445): problem connecting socket to 127.0.0.1 21:33:46 executing program 5: syz_read_part_table(0x0, 0x6000000, 0x0) 21:33:46 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x4000000, 0x0) [ 2842.819019] loop2: detected capacity change from 0 to 215922 21:33:46 executing program 7: syz_read_part_table(0x696e5b3, 0x3f000000, 0x0) 21:33:46 executing program 5: syz_read_part_table(0x0, 0x7000000, 0x0) [ 2842.883310] loop4: detected capacity change from 0 to 215922 21:33:46 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x5000000, 0x0) [ 2842.925539] loop2: detected capacity change from 0 to 215922 21:34:02 executing program 7: syz_read_part_table(0x696e5b3, 0x40000000, 0x0) 21:34:02 executing program 5: syz_read_part_table(0x0, 0x10000000, 0x0) 21:34:02 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) sendmsg$sock(r2, &(0x7f0000000440)={&(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}, 'veth1_vlan\x00'}}, 0x80, &(0x7f00000000c0)}, 0x48000) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:02 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6800, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:02 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4800, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:02 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6000000, 0x0) 21:34:02 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) r6 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000006c0)={{}, r7, 0x0, @inherit={0x60, &(0x7f0000000640)=ANY=[@ANYBLOB="030000000000000000000000000000000000e000000000000000000000000000070000000000000000000000000000000600000000000000ff00"/72]}, @subvolid=0x1}) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000016c0)={0x6, {{0xa, 0x4e24, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xf73}}}, 0x88) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f0000000440)={{r5}, r7, 0x2, @inherit={0x68, &(0x7f00000003c0)={0x1, 0x4, 0x40000, 0x3, {0x8, 0x0, 0x0, 0x5, 0x80000001}, [0xd796, 0x200, 0xb8, 0x8]}}, @subvolid=0x8}) 21:34:02 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:34:02 executing program 5: syz_read_part_table(0x0, 0x12000000, 0x0) 21:34:02 executing program 7: syz_read_part_table(0x696e5b3, 0x48000000, 0x0) [ 2858.992500] 9pnet_fd: p9_fd_create_tcp (11495): problem connecting socket to 127.0.0.1 [ 2859.080043] loop2: detected capacity change from 0 to 215922 [ 2859.129565] loop2: detected capacity change from 0 to 215922 21:34:02 executing program 3: ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0xfd, 0x3, 0xff, 0x0, 0xfffbfffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x2, @perf_config_ext={0x5, 0x3}, 0x0, 0x200, 0x3, 0x6, 0x1000, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:02 executing program 7: syz_read_part_table(0x696e5b3, 0x4c000000, 0x0) 21:34:02 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x7000000, 0x0) [ 2859.177970] blktrace: Concurrent blktraces are not allowed on sg0 21:34:02 executing program 5: syz_read_part_table(0x0, 0x20000000, 0x0) 21:34:02 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r3, 0xc010f508, &(0x7f00000000c0)={0x7, 0x9}) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:02 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c00, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2859.234810] loop4: detected capacity change from 0 to 215922 21:34:02 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x2000000, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) pwritev(r1, &(0x7f0000000880)=[{&(0x7f00000003c0)="3c1f3579f1bd7bad7a60b8ccc7df5d43d9de1dab64722f18fc43dafe9ce69de55fed68a6a59ee4e33c3b491eed0ecabe3cd3f3bfae27bad0f34545da4373d666fb1be37d25d7172368f73339dfcb02dbeec7a97b7c786b8fe2d18e188b75ae56510a867b3bb6237b94c3857fdb60d4ab59d5cc08", 0x74}, {&(0x7f0000000440)="e86944ddb0ba6de2bbc2cb0663a121ea65175b399532fdfa8e217c825f6cdc78fb8e5e805628d86ab7859699081aae84d76bcc79d0c39f34dfd67832e296f4dd066a871324c9d2ad6c79cf4cdc3fbe9faae6e6d9f0d23602d9a02691b8ba57e7fbdbc4b004ec8c1ca4b426152909f301de4fc63f65968c5fbaecd47a150e68641a6f34fdac39a610c82459631a0d578e589fcadc72c6d4cf873385ced304f5a3039cb74807f5af9c64f405c7d477ef6e79010d087cb7df63a33c36e1d927eb60736a18c1c55eb92a8196b40d4f0504040cfb5a66ac5b05d8e1cced39bdc2f5cfc31256ecad8b3e7a9b", 0xe9}, {&(0x7f0000000540)="c2f3b5b02552522239c6b63d3518baa40d911bff80000a749bee4b62d8b1ee31643c579c9b3d4b7dd35abf283a51e22bca1cd47ed2052ca8bb52cad7b8584ffa5d7da8fd42a6ec94eedda74dc2f49868496a140b9a30c7d4c2022d2be7df612daedb396aaa6c81551062311caf20ae5c57bbec97862a09f7678d3c6f45d69dec2fd81f88ebb6e7d5fb5734e6e0350c4a8de71f5e32f411e552798fc3541141115030a146636c5e3e62ad35a40177e99878e6487ac446956597faf5c9", 0xbc}, {&(0x7f0000000600)="c2b3d77cc1498350515795dcd07239f99e977528a0cfc25eae8a0ea031a01e3b26bf1b326c166224446d6e2686c4cdc5ea56c9f203588558a6f4858f7a140001672b7a3ea34a23cb22b48ce882537ab3db203423ceac692d50be20639b9c2280604aac76fe3cbb492861aab80a9eaca5aedf8cf62790e08326c14730252455346050a134f8e7c93966878755a5c68001ca76d6e837e01435041f648bfe9ecc7b14a3008d8fa05db547b022d6d984bdab6a607ac421d4ef4932107d45ecdf7a2712fe78a651afe1639e296588", 0xcc}, {&(0x7f0000000700)="59fc590b511b164a363dfed4c1eb6b76ce14653c6bf7cafe6de1a9f1ad6e99cc4423a8440da8b1ea7f8307355aa21ed0c3c5d83686f260ab208638cefdcf6a9315857d0bbe789d0e33553ee3b28084994f22a78a7706ef9601c344166e5a1e7599513428804ddb4a5fd07d147feeaa1d31dff8ad584ba32262ca6cc95517ad99cfd56b201d413f016cd21763284d765841875210a39cd0ba71a9089d8307d8d2035988360de968547d0f861ad53aa053b9f4b4e4900322ea463081c61f12f2128f", 0xc1}, {&(0x7f0000000800)="71f70a3db6e6f1c601f03bf73cc4bd2c860e8a32366ecad6a1c116597189a6bf000d90abd15135fc84af8a73ee0fa6b8175f5f1f6c1d8ccfa5803ec1a5f12ed2f77957db8a1f", 0x46}], 0x6, 0x9, 0xca2d) 21:34:03 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x8000000, 0x0) 21:34:03 executing program 7: syz_read_part_table(0x696e5b3, 0x55000000, 0x0) 21:34:03 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c00, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2859.427267] loop2: detected capacity change from 0 to 215922 [ 2859.466993] blktrace: Concurrent blktraces are not allowed on sg0 [ 2859.470149] loop2: detected capacity change from 0 to 215922 [ 2859.472537] blktrace: Concurrent blktraces are not allowed on sg0 [ 2859.500078] loop4: detected capacity change from 0 to 215922 21:34:20 executing program 5: syz_read_part_table(0x0, 0x2ccf95a6, 0x0) 21:34:20 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000000c0)) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x28, r6, 0xd0b, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX={0x8}, @ETHTOOL_A_RINGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x28}}, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f00000003c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, r5}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:20 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:34:20 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7400, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:20 executing program 7: syz_read_part_table(0x696e5b3, 0x55aaffff, 0x0) 21:34:20 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x9000000, 0x0) 21:34:20 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6800, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:20 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000000c0)={@desc={0x1, 0x0, @desc4}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14520cd7a26828d81a000000000000000100000001000000", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) ioctl$RTC_IRQP_SET(r7, 0x4008700c, 0x947) [ 2876.989728] 9pnet_fd: p9_fd_create_tcp (11552): problem connecting socket to 127.0.0.1 21:34:20 executing program 7: syz_read_part_table(0x696e5b3, 0x68000000, 0x0) [ 2877.059115] loop2: detected capacity change from 0 to 215922 21:34:20 executing program 5: syz_read_part_table(0x0, 0x3f000000, 0x0) [ 2877.107151] blktrace: Concurrent blktraces are not allowed on sg0 [ 2877.119020] loop2: detected capacity change from 0 to 215922 21:34:20 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xa000000, 0x0) 21:34:20 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x470001, 0x2) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @private=0xa010101}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x77b8585a) [ 2877.156287] loop4: detected capacity change from 0 to 215922 [ 2877.304209] loop4: detected capacity change from 0 to 215922 21:34:38 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c00, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:38 executing program 5: syz_read_part_table(0x0, 0x48000000, 0x0) 21:34:38 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:34:38 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a00, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:38 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xd000000, 0x0) 21:34:38 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x111000, 0x10) ioctl$int_out(r2, 0x0, &(0x7f00000003c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:38 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f00000003c0)='./file0\x00', 0x2400, 0x128) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:38 executing program 7: syz_read_part_table(0x696e5b3, 0x6a4b0300, 0x0) [ 2894.669420] 9pnet_fd: p9_fd_create_tcp (11587): problem connecting socket to 127.0.0.1 21:34:38 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xf000000, 0x0) 21:34:38 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r4, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r4, 0x20, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0xab}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008100}, 0x40040) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:38 executing program 0: keyctl$clear(0x7, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:38 executing program 5: syz_read_part_table(0x0, 0x4c000000, 0x0) [ 2894.757420] blktrace: Concurrent blktraces are not allowed on sg0 [ 2894.760112] loop2: detected capacity change from 0 to 215922 21:34:38 executing program 7: syz_read_part_table(0x696e5b3, 0x6c000000, 0x0) [ 2894.786467] loop2: detected capacity change from 0 to 215922 [ 2894.823074] loop4: detected capacity change from 0 to 215922 21:34:38 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7400, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:38 executing program 7: syz_read_part_table(0x696e5b3, 0x6f690000, 0x0) 21:34:38 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x11000000, 0x0) [ 2894.959651] loop4: detected capacity change from 0 to 215922 21:34:38 executing program 5: syz_read_part_table(0x0, 0x68000000, 0x0) 21:34:38 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) mount_setattr(r3, &(0x7f00000003c0)='./file0\x00', 0x800, &(0x7f0000000400)={0x100074, 0x173, 0x120000, {r0}}, 0x20) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2895.077143] loop2: detected capacity change from 0 to 215922 [ 2895.105699] blktrace: Concurrent blktraces are not allowed on sg0 21:34:54 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:34:54 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc2d6, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:54 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000440)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='./filc0\x00']) r5 = syz_open_dev$vcsa(&(0x7f00000003c0), 0x9, 0x204000) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000400)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000004c0)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000000600)={@remote, @empty, r7}, 0xc) 21:34:54 executing program 7: syz_read_part_table(0x696e5b3, 0x714b0300, 0x0) 21:34:54 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x12000000, 0x0) 21:34:54 executing program 5: syz_read_part_table(0x0, 0x6c000000, 0x0) 21:34:54 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f00000003c0)={&(0x7f00000000c0)=""/29, 0x1d, 0x0, 0x7}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:54 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a00, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:54 executing program 7: syz_read_part_table(0x696e5b3, 0x724b0300, 0x0) [ 2911.144210] blktrace: Concurrent blktraces are not allowed on sg0 [ 2911.145785] 9pnet_fd: p9_fd_create_tcp (11644): problem connecting socket to 127.0.0.1 [ 2911.152143] loop2: detected capacity change from 0 to 215922 21:34:54 executing program 5: syz_read_part_table(0x0, 0x74000000, 0x0) [ 2911.199151] blktrace: Concurrent blktraces are not allowed on sg0 [ 2911.202149] loop2: detected capacity change from 0 to 215922 [ 2911.211330] blktrace: Concurrent blktraces are not allowed on sg0 21:34:54 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x20000000, 0x0) 21:34:54 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x20, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0xfffffffe, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/16, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x4, 0x1000, 0x0, 0x4}, 0x0, 0x2, r3, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) finit_module(r4, &(0x7f00000000c0)='/dev/rtc0\x00', 0x2) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2911.243894] loop4: detected capacity change from 0 to 215922 21:34:54 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="140000000000003d5f92dcbcc52ad208", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:54 executing program 7: syz_read_part_table(0x696e5b3, 0x74000000, 0x0) 21:34:55 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc2d6, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:34:55 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x2ccf95a6, 0x0) [ 2911.507662] loop2: detected capacity change from 0 to 215922 [ 2911.558501] loop2: detected capacity change from 0 to 215922 [ 2911.571502] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2911.571534] Buffer I/O error on dev loop2, logical block 0, async page read [ 2911.571602] loop2: unable to read partition table [ 2911.571740] loop2: partition table beyond EOD, truncated 21:35:11 executing program 5: syz_read_part_table(0x0, 0x7a000000, 0x0) 21:35:11 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f00000000c0), &(0x7f00000003c0)=0x4) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:11 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xd6c2, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:11 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:35:11 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xd6c2, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:11 executing program 7: syz_read_part_table(0x696e5b3, 0x7a000000, 0x0) 21:35:11 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x3f000000, 0x0) 21:35:11 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x1, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x2, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) r4 = openat(r2, &(0x7f00000003c0)='./file0\x00', 0x1, 0x1) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = clone3(&(0x7f0000004c00)={0xc0000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) capset(&(0x7f0000000480)={0x20080522, r5}, &(0x7f0000000040)={0xfffffff9, 0xe385, 0x200, 0xa, 0x7fff, 0x80}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000580)=0x0) r7 = fork() clone3(&(0x7f0000000600)={0x1100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000780), {0x35}, &(0x7f00000004c0)=""/101, 0x65, &(0x7f0000000540)=""/51, &(0x7f00000005c0)=[r5, r6, 0xffffffffffffffff, 0xffffffffffffffff, r7], 0x5}, 0x58) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000700)={'sit0\x00', &(0x7f0000000680)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x3, 0x6, 0x4, @empty, @loopback, 0x7800, 0x12c39111372d71dd, 0x180, 0xbf}}) setsockopt$inet_mreqn(r8, 0x0, 0x24, &(0x7f0000000740)={@empty, @loopback, r9}, 0xc) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.nlink\x00') [ 2927.859965] blktrace: Concurrent blktraces are not allowed on sg0 [ 2927.863011] loop2: detected capacity change from 0 to 215922 21:35:11 executing program 7: syz_read_part_table(0x696e5b3, 0x97ffffff, 0x0) [ 2927.907164] 9pnet_fd: p9_fd_create_tcp (11697): problem connecting socket to 127.0.0.1 21:35:11 executing program 5: syz_read_part_table(0x0, 0x97ffffff, 0x0) [ 2927.942181] blktrace: Concurrent blktraces are not allowed on sg0 [ 2927.947277] loop2: detected capacity change from 0 to 215922 21:35:11 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x8001, 0x80}, 0x40250, 0x0, 0x0, 0x6, 0x1000, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x10}}], 0x10}, 0x40000) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfe}}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x210402, 0x0) openat2(r4, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x412d00, 0x10, 0x1}, 0x18) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x4, 0x4, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x40, 0x3, 0x0, 0x0, 0x400000}, 0x0, 0xc, 0xffffffffffffffff, 0xb) fchownat(r1, &(0x7f00000004c0)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff, 0x1000) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f00000000c0)) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2928.004904] loop4: detected capacity change from 0 to 215922 21:35:11 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x48000000, 0x0) 21:35:11 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xf000, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:11 executing program 7: syz_read_part_table(0x696e5b3, 0xa695cf2c, 0x0) [ 2928.148913] loop4: detected capacity change from 0 to 215922 21:35:11 executing program 5: syz_read_part_table(0x0, 0xa695cf2c, 0x0) [ 2928.266732] loop2: detected capacity change from 0 to 215922 21:35:11 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xf000, 0x1, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2928.300974] blktrace: Concurrent blktraces are not allowed on sg0 [ 2928.303311] loop2: detected capacity change from 0 to 215922 [ 2928.371154] blktrace: Concurrent blktraces are not allowed on sg0 [ 2928.424490] loop4: detected capacity change from 0 to 215922 [ 2928.465960] loop4: detected capacity change from 0 to 215922 21:35:28 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:35:28 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x4c000000, 0x0) 21:35:28 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x2, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:28 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000003c0)={'mangle\x00', 0x0, [0x0, 0xff, 0x4, 0x40, 0x6]}, &(0x7f00000000c0)=0x54) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)}, 0x10) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x6, 0x0, 0x20, 0x0, 0x9, 0x85, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000440), 0x5}, 0x8808, 0xfff, 0x1ff, 0x9, 0x800, 0x40, 0xe3d, 0x0, 0x9, 0x0, 0x400}, 0xffffffffffffffff, 0xa, r3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:28 executing program 7: syz_read_part_table(0x696e5b3, 0xc9ffffff, 0x0) 21:35:28 executing program 5: syz_read_part_table(0x0, 0xf6ffffff, 0x0) 21:35:28 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x2, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:28 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000003c0)=""/234) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2945.277235] 9pnet_fd: p9_fd_create_tcp (11759): problem connecting socket to 127.0.0.1 [ 2945.351114] blktrace: Concurrent blktraces are not allowed on sg0 [ 2945.368843] loop2: detected capacity change from 0 to 215922 21:35:29 executing program 7: syz_read_part_table(0x696e5b3, 0xf6ffffff, 0x0) 21:35:29 executing program 5: syz_read_part_table(0x0, 0xfcfdffff, 0x0) [ 2945.388483] loop4: detected capacity change from 0 to 215922 21:35:29 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x55000000, 0x0) 21:35:29 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x5, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x81, 0x9}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x4, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x125200, 0x98) getsockopt$inet_buf(r3, 0x0, 0x9, &(0x7f00000003c0)=""/255, &(0x7f00000000c0)=0xff) 21:35:29 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00', @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f00000000c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2945.508575] loop2: detected capacity change from 0 to 215922 21:35:42 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x3, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:42 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x8, 0x1000, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x6, 0x0, 0x0, 0x2000002, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:42 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x55aaffff, 0x0) 21:35:42 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x3, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:42 executing program 7: syz_read_part_table(0x696e5b3, 0xfcfdffff, 0x0) 21:35:42 executing program 5: syz_read_part_table(0x0, 0xfdfdffff, 0x0) 21:35:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000d1eab6a9e26332bf54f280b3", @ANYRES32=r3, @ANYBLOB="0000004052525a8f1b11f52b5b5506753c3249dc0c26552f7423d2284c66c8744a2e55d23f0b0a90cedb4f0c527f30314c9ef5529c32ee5e34c91fa536281d48da4e07343d256786a7de8f8ad0455e6042148f9a0a68ad3cb3fed8b76b25b4bfa05c286ebde086f10fbcf0823c930d"], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x1f, 0x2, 0x2, 0x1, 0x0, 0x0, 0x2081, 0x7, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x5, 0x3}, 0x801, 0x9, 0x6, 0x7, 0x80000000, 0x4700, 0x3, 0x0, 0xfffffffa, 0x0, 0x7}, r0, 0x6, r3, 0x8) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x9420, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000500)='./file0\x00', 0x7, 0x3, &(0x7f0000000740)=[{&(0x7f0000000540)="73b2bb0d7eae644907067b80bfa7f7dc393ef694a7766e0cc68ffce966bee09cedb9d904e8f0694dc1cee141f35b4e34cd92c480d2ac8d2d", 0x38, 0xfffffffffffffff9}, {&(0x7f0000000580)="f738b35ad1573c7e6f285fd44993f12bbcc2f8015a3252a284ee516f510700bdd5e2bbbb1ddd17e108c29efabe49585a742e7ef046dd57c8da4672307bd8bc6d1b5b97d20f7d907712c7bad98f7684195e19f1cf04d898052bbd33f76aac3998857c3c27f10e0cf941a6cca7ced7d5577e21950c559a3130dc2ac65d60193d75ae65f99cdc1520556770ac9c24decd96e2ef7ff1fc10", 0x96, 0xffffffff}, {&(0x7f0000000640)="345ab705a738e33788c915b447a0badf7bbc937a4d131f3cfe0901ec229f3af8866d9d12b0ff71196c252c1ce54ccdb24232931d71b3700cd477016aca02ea04ccb39be2979b0315c2e5df5087b507a773eff0cfa4b56167b93de927f344cd1fbc1e6fde55338c9633abba91a188bd8eb31ef9476d55c455782b26c17ebf5a3917662657affdba05378e79e072f08f6694a580c108760d05862022fc09353772890871e08fd1c548a8395c9b3d2ba4dc808b202ae90268773ac3367ffbd03ded338018418cc5b21e18eb33ccd2cb3b97ef4167082bc3645ba9113b073d723756d123b885c7ccaa8db1e35e90932f89fc947ef7e5e1", 0xf5, 0x4}], 0x1000, &(0x7f00000007c0)={[{'/proc/vmallocinfo\x00'}, {'$ -\'-)@.'}, {'!*-:\'%}'}, {'\\:.-'}, {'/dev/vcsa#\x00'}, {'!#'}, {'/dev/rtc0\x00'}, {'/dev/rtc0\x00'}, {'$:\x0e\\'}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@seclabel}]}) 21:35:43 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:35:43 executing program 5: syz_read_part_table(0x0, 0xfdffffff, 0x0) [ 2959.454643] 9pnet_fd: p9_fd_create_tcp (11813): problem connecting socket to 127.0.0.1 21:35:43 executing program 7: syz_read_part_table(0x696e5b3, 0xfdfdffff, 0x0) [ 2959.466501] blktrace: Concurrent blktraces are not allowed on sg0 [ 2959.469012] loop2: detected capacity change from 0 to 215922 [ 2959.486777] loop2: detected capacity change from 0 to 215922 [ 2959.501746] loop4: detected capacity change from 0 to 215922 21:35:43 executing program 5: syz_read_part_table(0x0, 0xfeffffff, 0x0) 21:35:43 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x68000000, 0x0) 21:35:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = clone3(&(0x7f0000004c00)={0xc0000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f00000003c0)={'ip6gre0\x00', 0x0, 0x2f, 0x81, 0x3, 0x0, 0x29, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x700, 0x8, 0x10001, 0x8}}) setsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000440)={@dev={0xac, 0x14, 0x14, 0x41}, @local, r4}, 0xc) capset(&(0x7f0000000000)={0x20080522, r1}, &(0x7f0000000040)={0xfffffff9, 0xe385, 0x200, 0x9, 0x80000, 0x7f}) r5 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r6, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x9) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:43 executing program 7: syz_read_part_table(0x696e5b3, 0xfdffffff, 0x0) [ 2959.576354] loop4: detected capacity change from 0 to 215922 21:35:43 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x10, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0x1, 0x1, 0x5, 0x0, 0x14afa46a, 0x180d4, 0xa, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_bp={&(0x7f00000000c0), 0xf}, 0x10, 0x9, 0xcded, 0x9, 0xe73, 0x9, 0x9, 0x0, 0xfffffeff, 0x0, 0x6}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) chdir(&(0x7f0000000440)='./file0\x00') ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:43 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x5, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:43 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x5, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:35:43 executing program 5: syz_read_part_table(0x0, 0xfffff000, 0x0) 21:35:43 executing program 7: syz_read_part_table(0x696e5b3, 0xfeffffff, 0x0) [ 2959.756255] loop2: detected capacity change from 0 to 215922 [ 2959.757611] blktrace: Concurrent blktraces are not allowed on sg0 [ 2959.816485] loop4: detected capacity change from 0 to 215922 21:36:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @private=0xa010106}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x8}}, 0x0, 0x3, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:01 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xa, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:01 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:36:01 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xa, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:01 executing program 5: syz_read_part_table(0x0, 0xfffffdfc, 0x0) 21:36:01 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) r3 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r3}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r5, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:01 executing program 7: syz_read_part_table(0x696e5b3, 0xff0f0000, 0x0) 21:36:01 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6a4b0300, 0x0) [ 2977.973700] 9pnet_fd: p9_fd_create_tcp (11872): problem connecting socket to 127.0.0.1 21:36:01 executing program 5: syz_read_part_table(0x0, 0xfffffdfd, 0x0) 21:36:01 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x0, 0x6}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2978.059059] loop2: detected capacity change from 0 to 215922 [ 2978.079253] blktrace: Concurrent blktraces are not allowed on sg0 [ 2978.109916] loop4: detected capacity change from 0 to 215922 21:36:01 executing program 7: syz_read_part_table(0x696e5b3, 0xffefffff, 0x0) [ 2978.121313] loop2: detected capacity change from 0 to 215922 21:36:01 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xe, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:01 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xe, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:01 executing program 5: syz_read_part_table(0x0, 0xffffff97, 0x0) 21:36:01 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000440), 0x200000, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0xffffffff}}, './file0\x00'}) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f00000003c0)={@initdev, @remote}, &(0x7f0000000400)=0xc) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:01 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6c000000, 0x0) 21:36:01 executing program 7: syz_read_part_table(0x696e5b3, 0xffffaa55, 0x0) 21:36:02 executing program 7: syz_read_part_table(0x696e5b3, 0xffffefff, 0x0) [ 2978.460293] blktrace: Concurrent blktraces are not allowed on sg0 [ 2978.462183] loop2: detected capacity change from 0 to 215922 [ 2978.502912] loop2: detected capacity change from 0 to 215922 [ 2978.526219] loop4: detected capacity change from 0 to 215922 21:36:18 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x14, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:18 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:36:18 executing program 5: syz_read_part_table(0x0, 0xfffffff6, 0x0) 21:36:18 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x6f690000, 0x0) 21:36:18 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x14, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:18 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x0, 0x2b, 0x0, 0xff, 0x0, 0x9, 0xa780, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x1000000000000000, r0, 0x3) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:18 executing program 7: syz_read_part_table(0x696e5b3, 0xfffff000, 0x0) 21:36:18 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000050500)={0x0, 0x0, "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", "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"}) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {r3}], 0x5, "af2f1a9317bc6f"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000340)={r4, 0x0, "0021baca37a851baa1807a8b2abdab5260abc14da99f37d1b3d3b757a27a85cff6273999732d5609fe110c4c9f961a557549863eb300ab6a308b38d8077ce9ab70ce630ea4318fe503ef7828207ff02c5e1cba57b3e2345936c8e34cc13bf9a37d0be8df6dbba9ac77bbbf9d911cb932ba838773f1586f2c204c278e625ad4391f0f52087f6198e607ee3865d434052a5f899b332a70b049483b14c0274b3241e4f064454057be78519bb00899511587bbe0758a4463519a99ca7cca29ec57cab59c94a26ce0fadc5187f469e03a8ab99b503b2e61dc076da48f35d07f1a0938ef2d37d1f2e6e642374e1d614cc2be040ca8dba256d12387d1ff3e2923ea8d3c", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000054d80)={0x0, 0x0, "e000051371b20bd393757163595660bfed959067a1fb832f1e2ec91e75f188e5af8cb17158d4c6d50ea8c5603699d1a00833141d5e9cb794630636ce138eb487fd28cfb9cc162571224cf5341b4d503c2fc41c8e44415d9296ef18943260c0c95312e0281de27f2aa6ef66c8a352074334e4d9c3b7dc2d04de3fe0eca8f0b02634f27c37f288fd734c7f290ad8fc18b8a1f73f20ec2e5910d1310ae7abc617717f963b0fc3b95d719f5885714d0b93d4d7ab70e104a5b10ce97b4fb66b496f5c2d629506e4f1552b3581fc10f23130f1eb1edfcbe8cfa85d4fe2c7bffa4ab8db4ef37bb21c34505069b92f5dd0a3f926805424964ffa7ef43deeda19d832bfef", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000055d80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000055f80)={0x0, 0x0, "368bcf3c8921d9311d9f523f309961989eeb86fc7c8abb6c26651dcc1d662ab3c81729523a6f63b45e5a41567a45556f7fec2900e1f558fe8f99fab32367a7b135dc762eedd65cdde6a0c4292a177a35f06c88aa3f2c629e48197449b1ff7bfa35afec21ffb70820ebe5f448b158074bce1db136d5ec1bc1fdd9f80d3fe2d080ab153c98b640cf1d6b5381657fea9690a2391cfbc5ca778a4949017af79624313ced3226f72049029347225c1a021d4465482a57246ae05bcb6ba1cc37e07ac9cb642ed2649fd4291dc3dbb46094f87f6f8c0388cd313c1b0bb5b32e32207878d31cc0461e4435d20ca09414f2b509b2fff55b22cc1354c4c9a61d6eceda286c", "19842f54175a0d752d3ed96eb099f1edebc52e335b0ce289df89bb7c519f8f76b7cc7fb41c4b26692fd409a85b7e93d997d68dc485a0f6a86508ca8dd9baf891a40292cfccb8b8eb868c6a8f3ec1039afaeba0c91cefa31211a87351727684e29d6c84b622cefe470f66d9fe0e020c2e2900f795ebb672bd11834bdb98af9417da1ce138b858ab536c4c61fff9374b1c60ae148493c589ae1ba08b94d477fd10b5a98253d3b9de4b576ca2d317343db3a601d960a55d0f2982755ce201f5dfb0e71edc4b550df380ce6ab833e4a694098f75734cbe0a1c94d510219ea6b40020d2f8405944cd2317fe441794a0a34015751f86f4cc18657ad6f24b6b547441aebcb6cc47e2427d5e270bc3eaf54cb8468aa6811f71b5e09e44f5d1168ca396d6af23a81afc346ef0ce7b81035a7a3c3c72a6d5a1b360fb0bfd089891535bbc161f470625ad3ea12fa987c5d537b10ca835c4755a150aff7c120c28eac6ca913f231bc5d1e6bc42e243ab090cef5dfd815e2827f1dc88ecca6575908cc6252b5e699964abf446f8c83857d8ba5b84d994f8d074e0c851535f76d3f31235d6ae790a370bf16a3489b2d8321bc08540ffa750e10b209ced2d28fd56e89d09c6205fb35e09fa4c8b5157dada7da7b11ea61686d43a9e482e0600c0b03a38dffae22cc0d04490b7118c8214bfa7b140e0d1fce59d6fcba38dcf9d0e946949d08dd5660c96688888133ac195d90f8fd09c9e98d3279728134de44a9608858cb55a7a8aaa2a7aab3d359094ffd9ee508618a61ea3e15fc326b1e89d22eef3fad7773b825ab6dba7ad53f40ffdb2114a9148b6dee3329ccbef545b0ffe83b0312176bc262c65188cb423802cbbeb7ad983b8b77d04524e21dec845216cfe285aac7fd4b54ddedd443d03f11c9e6f1eeb0a5affc335f65de94ceaee5dd102e5b27553157d968ba04099813cdaebe16332d43870a865aa0028e00d479b5a4b838d3709239d14d4972eef9a353d8ed654f69f15f54a60aaf4f5b0be4963db25b6155746358132680df2f7f481724c21b034702a1743dbd454d75541c0a7239f547b293df086a568f0438481d9260ab168807d0e407c68e6f60ee6973cbd37f1bb1185b04d86b7af73ec3506ceb3b44e3b6a324a6409001d7639b559ca66a52077950586397916e43ba49149c9e7e23a83949d178cb1a2e0aba8c013ceca02491e66bfd2f77395af797f0e6db3831ac26ea67dd9bd47ccad84894294c2c4228c02067c1a8e67a0ad6c4a554db8149cee0283d5e8bc475b228090a4380eef2436017147c6711e0b3c1c0b27ee1a98e596d81c6481fb4b410ce6b64b98fe4ee613cc29fc657893c32a7ce6e422f08a47645873eb348a82c63cc574b7db649ab21e631a1ccb745ee3c455e83ca88781bab4df119930da2e52a748d5444b54f8454033e50a1ea3217ae6c5be0cdff398da3e60d9bc29e54068b1888c31b2a9d77cf24e71479d6df4da71e0439a37ef1797b5986d302cc6d35af24ebc1b3b078e63ef871a65157624d944ae2e4b41dcde254dd2b875d6831f1686afde3261e6d87c4b835321737e98470b6933bbfbd463a312d8ee025d6bca9b2dd88dccf2b7498ba04e2401f76467714658c2bfd329c19d10dd881f23383249007192fc3deadb0390e8dafa116b16fd37ca2de499470ca2368192bafea55451a8070c6083fe191c96c7f99320a728b05a989adaccc5b93a60ec50e1b4e27de5124b5aaf2a445c896fbf04f2c0e9d861a3800277a9f70309d10a6e751b8eaa5541aea2d32b065983a0675565afae71b9f2e8e25780253fdaa972081e7ac708cc7a0fa6cc537a4ee45dcc97e3e0c6f91500e0772666ef37aed0e9ee873ce8ce9ece679101e39bcb3c4ecaefb365adf93b67e545b19dad54af1323f7447d5851f92e1c046f0be9ff7e7ac9fbf5665d288707ca345f0b87f189e4cc016162f0e67f3e1a50cbf8b80c545f235d9f50e3237a0f190d949aa56c97c60a816e65016485e7800e1b8939cfe215a6e20f599c4f1684a402dcc625cd15862586f286c20df7a8df8b41b3644a55c09c4065b1723a04ca271579130619db8a3d44d2506774d635e3db2f9c91e7463c67696a6f1c832a525da1a8683fe14b8bf295ecae0745fae133253a86981c3a0a425134e63a9ae6724dd590eec3ecef5cbccbd661fbf07d9fa8337b56cf0b53a7d26f6d960e8a334861f4c9bcdec2b23cd1b8cc6e628c36db7497528b00a25611eb05b9fb9acb92f4b7a43a896455801c60641f8e94ffa0843d29900595f394e3f82e16e89fd238bfed28e363a3c33ede538625dba6c5da0f93fce709e304e3d856139fcf56cb585f81b488bb0f50c1edcc538a66233e15c8cb35499b29095c1fe17096e489dba83316cc4ff8685f1cb4cd1bb99278b3d6c662d664c39ea11899da46f9701f091961dc9a861617075c2eae9f9ed07c0e67dc58f408315c91b92aae3e3c37b8d9bb2ff7a3ae595d2ff824c4868ca3a265839ce55adf934343723365eda657c5047cc50f18be82933a52bb9cfc50da3b8b42ee7ead598f07e083b7554feb7e89ab4a163a82ff4010096c3ff7b4245014f49d7fa3101f0d1967317240c478b546c32fb6ddec404a8e0a736080602148a5f00d41968bcf41e2e8f5e771c514ceff4ef2886694aab644709d07eb17a8ddf16b4c4765b97c5eb187210a753666ebd5bbc6ba87b962d64191d5ccc6de4f879ef59ac0f1839723874b9f8cdc80b9375f5fa5fa0e7cd2f7efd81c801626edee358309c53785d739f7e6d9e6b0c38116bbffbaa1fbc2e2ebb42785e59b3ca9ea579e4833b2a7923f226c677f8c4eef82f4f61d81eaec8eae9ef458c4ac1ca33d9b3dc13b3d132ce8283f449e06d4df29f3b8e9289fc220046059ca97ba58736865bdad5b5050cc23cce8fbeffc02aec2143f566a04f8c15fa8e36ac0fb28a053f35fe12ef26a1f90275646d3a9622440d33f47fa204b785eef64f324072c737ffb41a563dc1873d967c915b5b2b4475be28c625b172779932dd244b2b348260fbe7dee9bbbe2eb7ac297176f7659aeb76824b4ad3b2f765a2064c4f2c241a5c9780b963a51da45637897a3c1d27fd9ea5331e951642b0cfc790768fff1fb0e4e37ffe3e2249f8167ea83bc15ae2c0e8cc06d42f7ed1be87bfc35c52d6cd59e28db950f4e9de2cbc5f09700dcf83b0b00b5affec9e83a63a190e45934d316b413c009bfe8b63387b8b8fa13393542002d194471d7078d0b954845f412b9bf6658dcca7f4cff0385bfa679f3a4deb4c993727e1f8af6d766e32b2916a98e9ad22ad17c1cae5e0d291df1620e19fe385f582cae8ed9d1a0c37cbf1f7a0b5a3505c6a657db2d5400debca261985911ad8339847706b47c9b9b0714b985b2b2028e82e7257be10870b68173b0899a029fc7afbb0894291ebb22fb832ed70f239aaac2ab05a357be5a3c90c152d604b63af7eb8da8c274279225d46debf82321f3c77fdb61727fdc336defe46fefdac405ca0d9c2a874a77ce55c6d8878ba82d560a00f70db5a8b06a799a031d403a63d2c174e4a14f970800b80d57c564c6ba48c2aaf54f70f04c7f5deaed2f7035b48d4d13726504cd65882a7790d57a2a60223136b02309a95cdfc6037b212ba5d53bd62158976b7a0ee1ef39e72c5e8fe0889e2032bab2d1328916895092a9a2f87e1cc621eefd069aedbcc7124927ba35a276fa96eee9ccecfe89ecbc04bd81df3a5ef97e8f807aef75053f166cf852b18515e9f732d3560448be68ef0fa981b461c5a3c13d8f7fd9cad05f64de7185c2a2f2ba0f9c3786933d4c4951ca02807147db7e01f3ffc4a336b92cf5b576dd302abaf32c320c9e8d9b6b8c9d82a1aad8684faa0c3dbc89a756c69ac12921a222eb14888b8ac5432c6248185df0f70102db0e7224abbbf0d727c49afec70f027c089b3a7f7adca1714d6331a4fb863646943316dbdea0d41c597bd6f1562f6131c2db85125548286ce6f015fb4dea28576faff2a4f31af7c5455bc238404e987a7463b1b768e5095cdaa7dfd1e70857caec8853d031839b0c952aa76da9c67cb9ac91ddd0e0d7b43a22a574c225835cfc36cf8f3f08c5f159f893d132b016774145933bc3fddb7f7e7434abb80a11d7077a18886816bcc92d6b2ce99106b9371c868c961fdeebee8c03e7c1c173f770bd21fb1f689e75092757ba0c69ccd55db5760e81d5dc2054c481f35b8d8d0e888bb4633e6a33e6893929a27f46223454ad67eb36cf871fc5f95ed73a4b4bc32441e99bcf911fb3e3ff4e5dcc4735ff1b9cac9db977c703794b14b886ecd5cbc63d74f429e242ef04349621d01d9c1fa82a0e140e774d5e7d0889486046e130f466fbd078af9a9fc0f7c2acc89d86f6177f616fa6ff599bcb623ee05edf797bb26a3ce8475307ffed0915e7ffa536aec3a08c967ea24021d01b697f18d7dedf7a0a06bf0342d4ad3c3d649936493c50e37e2e6d80b248b122d01ffb0ff25e55ecb31767ebd22e78ea606dad1bd71799f15fa59a4a421be8ee5244f47d7b3aa9b1b6394dad851de586db49cbf90be82d2c12331c910d516a6207b0447610274eb498146f8d1056570fcac9c109c786e0bf0da09d5a703d89ead2f891928fefa4e8b5730bac735f07f88fc9bd3c18bdd085c634a4aa6cc8a647214b98af9749b57063772a9ead778ca6b00440ad3b63b3fcf1f767215beee07d9fa023be53bf47f81179b8204c34d606d3cf240a89678352df7b845b0275ddcc2240da0ab99488f8f28dd39352bb4a73f326d9df26ef7bf8bb067668c230a8703a6c478cfa2c6df457d3a3725d43143d299740706e0640113de68cd2598bfd1a232d7994843465a7522d201273cc4076682be2345041f6d06017c91e53b738d4c4084c7f02df6f63dee8f96b7cc6b6f4837dec622642b7625d47161e8d5cd21fa880bd8d1f8f442a63e2c25b99d343c35a9b817627279f90fa2b4f338aecd5d583fe747a13d85de739262906712c07b755fee122984827c16f410a2b8b5f4d94fb778b7eaf0f2d8da6c1540c48e1d2cd9edb58017c6ca76be771f8007bcdcc5028a360cd3a4aeb3eb15435d25442771aa6412069e18813f45ffcaf87a86bfacf64ab0970554c8bc53c7a4a157bb659dd1a800d223fb8b024a590474b5b56349687abadc6b4f2b6b96db03058aab234dd075c3d64281ad597026be21bbfbcc11cc672f786529ffba70c0d5e3c6cf94bf5ddd0f6171a7a4ce509c1d4206b0f97a2b5488ac2adcbf4610d495e1d2552a541e9ab07f2b5b0a20ff075669bab9d96d15e0396c34106bdc1691d4b59f33b990f8341b707ca6f72c358d06275a34bf513e356ab74d47d1352a86116216202d63643311a4b91accabd8dd4706b2159"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056f80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {r9, r10}, {0x0, r11}], 0x6, "f9ddfbbdee8f48"}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_read_part_table(0x10001, 0x3, &(0x7f0000000680)=[{&(0x7f00000003c0)="986bbceae80a2d2854154041b3a8ac1a00484821be653ba88d7080d46f08330ccfb9d47a879677e065aaf1cf96154398e664b66f274e4b2632d4c6c88acef436b8b4a6c6815b3b302c8c4d4d831c90166e802edf65d795ae1d713eff798fd5b669eb571fee69396f672d936fd8855659c2502e4ec7eb1d24c1b416400a43bc2ba981348d81f80ca2c789d6c9bb556fb0a050cb00ac1e54e538e2c378489e3a9267dfd86e81edb8fa4e682ecec5588959af36a1bad47f4dd307dd02de38bebafdebb6ec96671172f273431bd4364839c95c26fbd7b398591bc024b490fd9386f66c4e00f716f77d864d72196ceefb35cde11b", 0xf2, 0x3}, {&(0x7f00000004c0)="09123e48de6807744b958593ca317b7a955859deb6dedcd53ea9ed575d02e8d267552bc5971634ba9b85350fe03933864db101c2a20e086c286166f7edde0793f0a45a977410dfbb13f31bd87c78e1a97e8ffdf01954531f2a5d12f10445496921e35088b2c83c2d82987cb6aaf2dacb40ac4a60132885325f9414a32df4e9698951d3426b2479797a6586978744ea246e86d6d7c155c9504a4c59555bc7ddf0efa12c8e0a398c984fe4", 0xaa, 0x8000}, {&(0x7f0000000580)="87aa05c1fa2149d567d587f4db80e2bfbc91044ded42f15203400286ed06a95fb400443068eb757cf91560e22c7de61da0e0abe677830620bfc6d318b82f910d66234b300953055be50fa43de87513fe8e4f55dc632f03f9ed9c0b32752ab40ebb5ac630a29538d89f8cc09747a13b291ac5bff0ee5cce48efded87da7e8e84243b05921101a8af4aab8cdd6105e8c37ef8ac9707beb93076736f8386a8149e610c6c765e51f8c54f5d3a45eda909a5de8390cecbedc14461c1e2c9a5faa6396f835cdc88476a356e2f2527f4b4c141c52941ff73e06da1bab1a0d5a945b59e7e886030bdd30e98cd5e3ad76bfea3610a5cbf80e7df711", 0xf7, 0x7}]) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 2994.746512] 9pnet_fd: p9_fd_create_tcp (11927): problem connecting socket to 127.0.0.1 21:36:18 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x714b0300, 0x0) [ 2994.831042] loop2: detected capacity change from 0 to 215922 21:36:18 executing program 7: syz_read_part_table(0x696e5b3, 0xfffffdfc, 0x0) [ 2994.856215] blktrace: Concurrent blktraces are not allowed on sg0 21:36:18 executing program 5: syz_read_part_table(0x0, 0xfffffffd, 0x0) [ 2994.918994] loop4: detected capacity change from 0 to 215922 [ 2994.933458] loop2: detected capacity change from 0 to 215922 21:36:18 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x0, 0xfd, 0x1, 0xff, 0x0, 0x0, 0x10548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x1f, 0x6, 0x1000, 0xcf4}, 0x0, 0x0, r0, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:18 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) fcntl$getflags(r0, 0x40a) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000440)={0x40000000, 0x5, 0x3}) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x9, 0x60, 0x6, 0xa, 0x0, 0x0, 0x52, 0x6, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x8040, 0xfc00000000000, 0x5, 0x8, 0x7, 0x40, 0x7, 0x0, 0xfffffffc, 0x0, 0x800}, 0x0, 0x4, r2, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f00000004c0)=0x6) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000480)) 21:36:18 executing program 5: syz_read_part_table(0x0, 0xfffffffe, 0x0) 21:36:18 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x724b0300, 0x0) 21:36:34 executing program 7: syz_read_part_table(0x696e5b3, 0xfffffdfd, 0x0) 21:36:34 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xc2d6, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:34 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x74000000, 0x0) 21:36:34 executing program 5: syz_read_part_table(0x0, 0x1000000000, 0x0) 21:36:34 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0) writev(r2, &(0x7f0000001840)=[{&(0x7f00000003c0)="fb086aacc8b5e4c3d7a677c9195e0d3de3efc240d635ebb2f01b0ff2450c0158b70848612c954eb80790269119f1434a3ce6fcf4fafc", 0x36}, {&(0x7f0000000400)="229d11a353a7fd475c75f39e215e0aea083e79056d84f199807f1fd5ae15b3994505599b885cce698d29288d66235e5db391a7cfb5b44ffed2f13109ff21cc3f9d4dfc22349b1869bc4e69ee68b55fb13e2d8ee975de2482b1578e038f8aac79ac", 0x61}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001500)="25e3e300a619aab9fad3521d461e4b5e27df6521a64302ab4572bbf63d1f951400636376e17ca15d0ca5dfacaefca41097cd3947ed6bff872bce45f7703857b6a48df907cc31810426848835f882d365a2e3ae186083f121fdca96087281201b569318cfb2b8b1d2", 0x68}, {&(0x7f0000001580)="31e49943fc9467779911eff9b301f86c7fa012ac6d2fbe3950316a43a27240d32981effc7c707277417848d4e0bd0fc551c22781cd757e3c10fd6326ee9460f9b2300f35166c403fba9a581a9c18663f3f385798f536e229d984ae412cce5fda5bacce6f609800f4dcedb8", 0x6b}, {&(0x7f0000001600)="6a3974045394a1fc1dd4dcb931c6a40069fd7392489df446d5267a6f8cb5801ca3c3a5f4b72a252c025e7ce791a071255261fd60ed274cf6885a349ef0da6da632f4ff52dfb5c616489788b2", 0x4c}, {&(0x7f0000001680)="c4bd22e4e39db83879cce02e031a77a48607619594824100d404f05bd37686a175b45f80ecb697486eaaa25cda3e941058ebc0a0fed17964a7ade5d2721d313aae23d5d33f9b70f8199773ae8711bd01e94fc6f415db7b7aaa5a98ce1cb8807c50a5ebefcd1808caf3f09fc87c39ca6f326e0315ed0bb7d739aacc2a2d86acfade5837ed672e239145dc1cc6d7d685a66f687181d05e373ea51d8ebb25d778ea7e71faf3e762032798a9a1b4be14cb738794cff00ccc9c09a3d18d9953ae7d889c345fe028359f6a144a142b2bf6603b6524cd2e79f41c535caa1b3a704c9f02131122b764fe30", 0xe7}, {&(0x7f0000001780)="ab8ecfdc5b6fb7f55dca932294de7597e0ab6e789814b24647203763e91654003660b24b9aa20e3bbc5305df876b23fe871adb2a6a03072ed020717058d0d3f5654112d16267df518a63c5031ebc2b51aa497585f88fe4ab0907bf4a2fa0440dce8c1574c977ac691912f2d5b0705c7d", 0x70}, {&(0x7f0000001800)="296ec9a6c8fc74f1b9eb1347e3a1853a1b3fac4a959c5b2725cfad58edf76bf9fd3df0f4bba3fc98c171", 0x2a}], 0x9) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x20140, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:34 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000580)={0x1, 0x0, 0x1000, 0x5e, &(0x7f0000000400)="aba277e323637545b1dadd83a37c66ffb87ec153125e4080d9a2d0b127769d6f5633bf209ff314aebd492170e7c625391fef5cb7602fd6f53700bb59554b525c4e94386e1871571421b3949b65972b3b17f6628bf37fe9e8157b7616b7cb", 0xcd, 0x0, &(0x7f0000000480)="617ef3205c6445a298bf16dde23a26f10f4f152ab5eaefeb1258237a5d19a4124ba26591ef16b9662d03b5ea5add461e9975b92700e4dad57cf0d8af32ac9a57a35d02df8ead93b4e84203cdb334d3bb0f8128ef26cd3ea8e37a995887078e7fca3b7e8067d392bf8f15353aedb570c656973edd5bdbb6265037ec43c2179dbc1e97a3b48b49096be4e0c033798166eca2954cdf9ce2546f9304a692592c9fac3c555da4620012391ba9d9d8b7ac9ec6a270aeffedb105c26a443f429414b0ad0f29ddb64c7a01b99e2fbab8a6"}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:34 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xc2d6, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:34 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) [ 3011.377027] 9pnet_fd: p9_fd_create_tcp (11981): problem connecting socket to 127.0.0.1 21:36:35 executing program 5: syz_read_part_table(0x0, 0x8000000000000, 0x0) 21:36:35 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x7a000000, 0x0) 21:36:35 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000003c0), 0x4) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 3011.454764] blktrace: Concurrent blktraces are not allowed on sg0 [ 3011.465700] loop2: detected capacity change from 0 to 215922 [ 3011.466153] blktrace: Concurrent blktraces are not allowed on sg0 21:36:35 executing program 7: syz_read_part_table(0x696e5b3, 0xffffff97, 0x0) 21:36:35 executing program 5: syz_read_part_table(0x0, 0x40000000000000, 0x0) [ 3011.520791] loop4: detected capacity change from 0 to 215922 21:36:35 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xa695cf2c, 0x0) 21:36:35 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x8, 0xff, 0x0, 0x70d, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x8, 0x0, 0xfffffffd, 0x6, 0x1000}, 0x0, 0x0, r0, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) getsockopt$inet_buf(r4, 0x0, 0x2b, &(0x7f00000003c0)=""/176, &(0x7f00000000c0)=0xb0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 3011.594629] loop2: detected capacity change from 0 to 215922 21:36:35 executing program 7: syz_read_part_table(0x696e5b3, 0xffffffc9, 0x0) [ 3014.767534] syz-executor.2: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 3014.767657] CPU: 1 PID: 11998 Comm: syz-executor.2 Not tainted 5.18.0-rc5-next-20220502 #1 [ 3014.767677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3014.767689] Call Trace: [ 3014.767694] [ 3014.767701] dump_stack_lvl+0x8b/0xb3 [ 3014.767727] warn_alloc.cold+0x95/0x18a [ 3014.767750] ? zone_watermark_ok_safe+0x240/0x240 [ 3014.767771] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3014.767803] ? __alloc_pages_slowpath.constprop.0+0xcc9/0x1f10 [ 3014.767827] ? oom_killer_disable+0x270/0x270 [ 3014.767864] __alloc_pages_slowpath.constprop.0+0x1a21/0x1f10 [ 3014.767909] ? warn_alloc+0x190/0x190 [ 3014.767942] ? prepare_alloc_pages+0x371/0x500 [ 3014.767969] ? lock_is_held_type+0xd7/0x130 [ 3014.768024] __alloc_pages+0x403/0x4e0 [ 3014.768042] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3014.768060] ? lockdep_hardirqs_on+0x79/0x100 [ 3014.768086] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3014.768115] ? alloc_pages+0x39/0x2f0 [ 3014.768148] alloc_pages+0x1a0/0x2f0 [ 3014.768172] relay_open_buf.part.0+0x2a4/0xc00 [ 3014.768213] relay_open+0x4ec/0x970 [ 3014.768242] do_blk_trace_setup+0x4bc/0xb60 [ 3014.768274] __blk_trace_setup+0xca/0x180 [ 3014.768298] ? do_blk_trace_setup+0xb60/0xb60 [ 3014.768343] ? lock_is_held_type+0xd7/0x130 [ 3014.768365] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 3014.768401] blk_trace_setup+0x43/0x60 [ 3014.768428] sg_ioctl+0x6a8/0x2820 [ 3014.768459] ? selinux_inode_getsecctx+0x90/0x90 [ 3014.768492] ? sg_write+0x110/0x110 [ 3014.768531] ? selinux_file_ioctl+0xb1/0x260 [ 3014.768559] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 3014.768589] ? sg_write+0x110/0x110 [ 3014.768614] __x64_sys_ioctl+0x196/0x210 [ 3014.768649] do_syscall_64+0x3b/0x90 [ 3014.768672] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3014.768697] RIP: 0033:0x7fcf101e9b19 [ 3014.768721] Code: Unable to access opcode bytes at RIP 0x7fcf101e9aef. [ 3014.768728] RSP: 002b:00007fcf0d71d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3014.768744] RAX: ffffffffffffffda RBX: 00007fcf102fd0e0 RCX: 00007fcf101e9b19 [ 3014.768755] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000008 [ 3014.768766] RBP: 00007fcf10243f6d R08: 0000000000000000 R09: 0000000000000000 [ 3014.768776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3014.768786] R13: 00007ffc88c1e99f R14: 00007fcf0d71d300 R15: 0000000000022000 [ 3014.768820] [ 3014.768898] Mem-Info: [ 3014.768904] active_anon:23678 inactive_anon:47109 isolated_anon:0 [ 3014.768904] active_file:24 inactive_file:9 isolated_file:0 [ 3014.768904] unevictable:0 dirty:0 writeback:0 [ 3014.768904] slab_reclaimable:10196 slab_unreclaimable:59233 [ 3014.768904] mapped:69641 shmem:109 pagetables:1060 bounce:0 [ 3014.768904] kernel_misc_reclaimable:0 [ 3014.768904] free:2615 free_pcp:63 free_cma:0 [ 3014.768952] Node 0 active_anon:94712kB inactive_anon:188436kB active_file:96kB inactive_file:36kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278564kB dirty:0kB writeback:0kB shmem:436kB writeback_tmp:0kB kernel_stack:4064kB pagetables:4240kB all_unreclaimable? yes [ 3014.768996] Node 0 DMA free:6484kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3014.769047] lowmem_reserve[]: 0 1615 1615 1615 [ 3014.769070] Node 0 DMA32 free:3976kB boost:6144kB min:11264kB low:12916kB high:14568kB reserved_highatomic:2048KB active_anon:94712kB inactive_anon:188436kB active_file:76kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:252kB local_pcp:252kB free_cma:0kB [ 3014.769122] lowmem_reserve[]: 0 0 0 0 [ 3014.769141] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 3014.769241] Node 0 DMA32: 477*4kB (ME) 123*8kB (MH) 52*16kB (UM) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3724kB [ 3014.769367] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3014.769381] 133 total pagecache pages [ 3014.769387] 0 pages in swap cache [ 3014.769391] Swap cache stats: add 0, delete 0, find 0/0 [ 3014.769402] Free swap = 0kB [ 3014.769406] Total swap = 0kB [ 3014.769411] 524158 pages RAM [ 3014.769416] 0 pages HighMem/MovableOnly [ 3014.769421] 105733 pages reserved 21:36:53 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)}, 0x0) statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 21:36:53 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:53 executing program 7: syz_read_part_table(0x696e5b3, 0xfffffff6, 0x0) 21:36:53 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xd6c2, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:53 executing program 5: syz_read_part_table(0x0, 0xf0ffffffffffff, 0x0) 21:36:53 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xd6c2, 0xd6c2}) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:53 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xc9ffffff, 0x0) 21:36:53 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x1980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) [ 3029.745986] 9pnet_fd: p9_fd_create_tcp (12023): problem connecting socket to 127.0.0.1 [ 3029.884263] loop2: detected capacity change from 0 to 215922 21:36:53 executing program 6: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0xf6ffffff, 0x0) 21:36:53 executing program 7: syz_read_part_table(0x696e5b3, 0xfffffffd, 0x0) [ 3029.955988] loop4: detected capacity change from 0 to 215922 21:36:53 executing program 5: syz_read_part_table(0x0, 0x100000000000000, 0x0) 21:36:53 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) 21:36:53 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00) r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) syz_mount_image$iso9660(&(0x7f0000002780), &(0x7f00000027c0)='./file0\x00', 0x40, 0x3, &(0x7f0000002980)=[{&(0x7f0000002800)="796c28bc366177e269a65648500461c89695e684d6dcd5e311f1ec0536d7c900ed6ce38228f28ad3767957218beea87515f62493eff11eb77f40bd2798e1c27b", 0x40, 0xffffffffffffffc1}, {&(0x7f0000002840)="74e1e6efad7f225d8678c5fefe62318fd9190921d0ef9dc3d2f29f394ad52fb45d8257594283c818a0f2b59e7bc0d7c94c4692484283106e381513", 0x3b, 0xa9}, {&(0x7f0000002880)="e1b5e9031575ed06c47ea5bf598664b64d7a05bde2cda779f925d18012bbc0f3499f45558873e94ef4683353db005187b949525ac3d866026be2a51328289faddce3325f442beffa1b1081e754bd069d2028656e1596b35629fbf330cb79c950a966f981c14fbf259b3a6bf454508244ed266e272527c471286a60248e9c46eebf5c713ba7f4e51fb554ba5acc2b0ba2ea63ba5f40a0cf6f7ed52cc8820086b2eec00aa9f694b4d6ef1d33792c1980207b22baa2966702cf04ea209c8080da735df14730eca022ea984f478865c0e8300ab811341d48cc9cc084f72e82709671581037a6", 0xe4, 0x100000001}], 0x40480, &(0x7f0000002a00)={[{@overriderock}, {@check_strict}], [{@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/vcsa#\x00'}}]}) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000002740), 0x4003, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r4, 0x541c, &(0x7f0000001440)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_read_part_table(0x696e5b3, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) preadv(r5, &(0x7f00000026c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f00000013c0)=""/123, 0x7b}, {&(0x7f0000001500)=""/176, 0xb0}, {&(0x7f00000015c0)=""/107, 0x6b}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/70, 0x46}], 0x7, 0x7, 0x2) [ 3030.646533] loop2: detected capacity change from 0 to 215922 [ 3031.461196] syz-executor.4 invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=0 [ 3031.461227] CPU: 0 PID: 298 Comm: syz-executor.4 Not tainted 5.18.0-rc5-next-20220502 #1 [ 3031.461245] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3031.461255] Call Trace: [ 3031.461260] [ 3031.461267] dump_stack_lvl+0x8b/0xb3 [ 3031.461290] dump_header+0x10b/0x7e4 [ 3031.461324] oom_kill_process.cold+0x10/0x15 [ 3031.461355] out_of_memory+0x11e5/0x14a0 [ 3031.461385] ? oom_killer_disable+0x270/0x270 [ 3031.461417] __alloc_pages_slowpath.constprop.0+0x1972/0x1f10 [ 3031.461461] ? warn_alloc+0x190/0x190 [ 3031.461491] ? prepare_alloc_pages+0x371/0x500 [ 3031.461525] __alloc_pages+0x403/0x4e0 [ 3031.461542] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3031.461560] ? lock_is_held_type+0xd7/0x130 [ 3031.461593] ? __filemap_get_folio+0x2d4/0xfe0 [ 3031.461617] ? lock_downgrade+0x6d0/0x6d0 [ 3031.461639] ? lock_is_held_type+0xd7/0x130 [ 3031.461668] alloc_pages+0x1a0/0x2f0 [ 3031.461693] __filemap_get_folio+0x65f/0xfe0 [ 3031.461729] ? filemap_read+0xba0/0xba0 [ 3031.461773] filemap_fault+0x156a/0x2140 [ 3031.461810] ? __filemap_get_folio+0xfe0/0xfe0 [ 3031.461856] __do_fault+0x113/0x5a0 [ 3031.461882] __handle_mm_fault+0x13bc/0x3670 [ 3031.461909] ? lock_is_held_type+0xd7/0x130 [ 3031.461932] ? __pmd_alloc+0x680/0x680 [ 3031.461981] handle_mm_fault+0x2e6/0xa20 [ 3031.462009] do_user_addr_fault+0x54a/0x12a0 [ 3031.462043] exc_page_fault+0xa2/0x1a0 [ 3031.462066] ? asm_exc_page_fault+0x8/0x30 [ 3031.462089] asm_exc_page_fault+0x1e/0x30 [ 3031.462110] RIP: 0033:0x7fe07cf74688 [ 3031.462130] Code: Unable to access opcode bytes at RIP 0x7fe07cf7465e. [ 3031.462137] RSP: 002b:00007ffe4ef70ca0 EFLAGS: 00010206 [ 3031.462151] RAX: 0000001b2de20000 RBX: 00000000000003b1 RCX: 00000000002e3fd8 [ 3031.462161] RDX: 00000000002e40de RSI: 00007ffe4ef70d60 RDI: 0000000000000001 [ 3031.462171] RBP: 00007ffe4ef70cfc R08: 0000000000000bd7 R09: 00007ffe4efc3080 [ 3031.462182] R10: 00007ffe4efc3090 R11: 000000000055fa38 R12: 0000000000000032 [ 3031.462193] R13: 00000000002e3da7 R14: 0000000000000012 R15: 00007ffe4ef70d60 [ 3031.462225] [ 3031.462294] Mem-Info: [ 3031.462300] active_anon:23678 inactive_anon:46859 isolated_anon:11 [ 3031.462300] active_file:0 inactive_file:11 isolated_file:0 [ 3031.462300] unevictable:0 dirty:0 writeback:0 [ 3031.462300] slab_reclaimable:7485 slab_unreclaimable:62348 [ 3031.462300] mapped:69638 shmem:109 pagetables:1028 bounce:0 [ 3031.462300] kernel_misc_reclaimable:0 [ 3031.462300] free:3379 free_pcp:62 free_cma:0 [ 3031.462376] Node 0 active_anon:94712kB inactive_anon:187436kB active_file:0kB inactive_file:44kB unevictable:0kB isolated(anon):44kB isolated(file):0kB mapped:278552kB dirty:0kB writeback:0kB shmem:436kB writeback_tmp:0kB kernel_stack:4128kB pagetables:4112kB all_unreclaimable? no [ 3031.462415] Node 0 DMA free:6504kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3031.462462] lowmem_reserve[]: 0 1615 1615 1615 [ 3031.462483] Node 0 DMA32 free:7012kB boost:0kB min:5120kB low:6772kB high:8424kB reserved_highatomic:2048KB active_anon:94712kB inactive_anon:187352kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 3031.462532] lowmem_reserve[]: 0 0 0 0 [ 3031.462551] Node 0 DMA: 0*4kB 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6504kB [ 3031.462698] Node 0 DMA32: 290*4kB (UMH) 109*8kB (UMEH) 65*16kB (UMH) 35*32kB (UMEH) 21*64kB (MH) 3*128kB (UH) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 6944kB [ 3031.462799] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3031.462814] 139 total pagecache pages [ 3031.462819] 0 pages in swap cache [ 3031.462824] Swap cache stats: add 0, delete 0, find 0/0 [ 3031.462833] Free swap = 0kB [ 3031.462837] Total swap = 0kB [ 3031.462841] 524158 pages RAM [ 3031.462846] 0 pages HighMem/MovableOnly [ 3031.462850] 105733 pages reserved [ 3031.462855] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=298,uid=0 [ 3031.463086] Out of memory (oom_kill_allocating_task): Killed process 298 (syz-executor.4) total-vm:93280kB, anon-rss:384kB, file-rss:34096kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:0 [ 3031.610014] syz-executor.2 invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=0 [ 3031.610050] CPU: 1 PID: 297 Comm: syz-executor.2 Not tainted 5.18.0-rc5-next-20220502 #1 [ 3031.610070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3031.610082] Call Trace: [ 3031.610088] [ 3031.610095] dump_stack_lvl+0x8b/0xb3 [ 3031.610124] dump_header+0x10b/0x7e4 [ 3031.610160] oom_kill_process.cold+0x10/0x15 [ 3031.610195] out_of_memory+0x11e5/0x14a0 [ 3031.610231] ? oom_killer_disable+0x270/0x270 [ 3031.610269] __alloc_pages_slowpath.constprop.0+0x1972/0x1f10 [ 3031.610326] ? warn_alloc+0x190/0x190 [ 3031.610361] ? prepare_alloc_pages+0x371/0x500 [ 3031.610401] __alloc_pages+0x403/0x4e0 [ 3031.610423] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3031.610443] ? lock_is_held_type+0xd7/0x130 [ 3031.610482] ? __filemap_get_folio+0x2d4/0xfe0 [ 3031.610511] ? lock_downgrade+0x6d0/0x6d0 [ 3031.610535] ? lock_is_held_type+0xd7/0x130 [ 3031.610569] alloc_pages+0x1a0/0x2f0 [ 3031.610598] __filemap_get_folio+0x65f/0xfe0 [ 3031.610639] ? filemap_read+0xba0/0xba0 [ 3031.610687] filemap_fault+0x156a/0x2140 [ 3031.610727] ? __filemap_get_folio+0xfe0/0xfe0 [ 3031.610776] __do_fault+0x113/0x5a0 [ 3031.610804] __handle_mm_fault+0x13bc/0x3670 [ 3031.610834] ? lock_is_held_type+0xd7/0x130 [ 3031.610861] ? __pmd_alloc+0x680/0x680 [ 3031.610920] handle_mm_fault+0x2e6/0xa20 [ 3031.610953] do_user_addr_fault+0x54a/0x12a0 [ 3031.610995] exc_page_fault+0xa2/0x1a0 [ 3031.611021] ? asm_exc_page_fault+0x8/0x30 [ 3031.611047] asm_exc_page_fault+0x1e/0x30 [ 3031.611072] RIP: 0033:0x7fcf10196688 [ 3031.611096] Code: Unable to access opcode bytes at RIP 0x7fcf1019665e. [ 3031.611104] RSP: 002b:00007ffc88c1ebf0 EFLAGS: 00010216 [ 3031.611119] RAX: 0000001b2dd20000 RBX: 0000000000000396 RCX: 00000000002e3fd8 [ 3031.611131] RDX: 00000000002e40f0 RSI: 00007ffc88c1ecb0 RDI: 0000000000000001 [ 3031.611143] RBP: 00007ffc88c1ec4c R08: 0000000000000bd7 R09: 00007ffc88c85080 [ 3031.611155] R10: 00007ffc88c85090 R11: 000000000055fa5c R12: 0000000000000032 [ 3031.611167] R13: 00000000002e3db8 R14: 0000000000000011 R15: 00007ffc88c1ecb0 [ 3031.611205] [ 3031.611254] Mem-Info: [ 3031.611260] active_anon:23678 inactive_anon:46859 isolated_anon:11 [ 3031.611260] active_file:14 inactive_file:26 isolated_file:0 [ 3031.611260] unevictable:0 dirty:0 writeback:0 [ 3031.611260] slab_reclaimable:7485 slab_unreclaimable:62348 [ 3031.611260] mapped:69638 shmem:109 pagetables:1007 bounce:0 [ 3031.611260] kernel_misc_reclaimable:0 [ 3031.611260] free:2844 free_pcp:180 free_cma:0 [ 3031.611328] Node 0 active_anon:94712kB inactive_anon:187436kB active_file:56kB inactive_file:104kB unevictable:0kB isolated(anon):44kB isolated(file):0kB mapped:278552kB dirty:0kB writeback:0kB shmem:436kB writeback_tmp:0kB kernel_stack:4128kB pagetables:4028kB all_unreclaimable? yes [ 3031.611372] Node 0 DMA free:6480kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3031.611425] lowmem_reserve[]: 0 1615 1615 1615 [ 3031.611447] Node 0 DMA32 free:4896kB boost:6144kB min:11264kB low:12916kB high:14568kB reserved_highatomic:2048KB active_anon:94712kB inactive_anon:187352kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:720kB local_pcp:472kB free_cma:0kB [ 3031.611501] lowmem_reserve[]: 0 0 0 0 [ 3031.611523] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6480kB [ 3031.611624] Node 0 DMA32: 225*4kB (MH) 55*8kB (UMEH) 30*16kB (UMH) 24*32kB (UMEH) 11*64kB (UMH) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 4572kB [ 3031.611725] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3031.611740] 139 total pagecache pages [ 3031.611746] 0 pages in swap cache [ 3031.611751] Swap cache stats: add 0, delete 0, find 0/0 [ 3031.611762] Free swap = 0kB [ 3031.611768] Total swap = 0kB [ 3031.611774] 524158 pages RAM [ 3031.611779] 0 pages HighMem/MovableOnly [ 3031.611785] 105733 pages reserved [ 3031.611792] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0,global_oom,task_memcg=/syz2,task=syz-executor.2,pid=297,uid=0 [ 3031.611863] Out of memory (oom_kill_allocating_task): Killed process 297 (syz-executor.2) total-vm:93280kB, anon-rss:388kB, file-rss:33496kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:0 [ 3031.623925] in:imklog invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=0 [ 3031.623960] CPU: 1 PID: 191 Comm: in:imklog Not tainted 5.18.0-rc5-next-20220502 #1 [ 3031.623979] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3031.623992] Call Trace: [ 3031.623998] [ 3031.624005] dump_stack_lvl+0x8b/0xb3 [ 3031.624033] dump_header+0x10b/0x7e4 [ 3031.624070] oom_kill_process.cold+0x10/0x15 [ 3031.624104] out_of_memory+0x11e5/0x14a0 [ 3031.624139] ? oom_killer_disable+0x270/0x270 [ 3031.624171] __alloc_pages_slowpath.constprop.0+0x1972/0x1f10 [ 3031.624216] ? warn_alloc+0x190/0x190 [ 3031.624260] ? prepare_alloc_pages+0x371/0x500 [ 3031.624295] __alloc_pages+0x403/0x4e0 [ 3031.624317] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3031.624333] ? lock_is_held_type+0xd7/0x130 [ 3031.624370] ? __filemap_get_folio+0x2d4/0xfe0 [ 3031.624397] ? lock_downgrade+0x6d0/0x6d0 [ 3031.624421] ? lock_is_held_type+0xd7/0x130 [ 3031.624452] alloc_pages+0x1a0/0x2f0 [ 3031.624477] __filemap_get_folio+0x65f/0xfe0 [ 3031.624515] ? filemap_read+0xba0/0xba0 [ 3031.624567] filemap_fault+0x156a/0x2140 [ 3031.624607] ? __filemap_get_folio+0xfe0/0xfe0 [ 3031.624649] __do_fault+0x113/0x5a0 [ 3031.624674] __handle_mm_fault+0x13bc/0x3670 [ 3031.624702] ? lock_is_held_type+0xd7/0x130 [ 3031.624727] ? __pmd_alloc+0x680/0x680 [ 3031.624785] handle_mm_fault+0x2e6/0xa20 [ 3031.624814] do_user_addr_fault+0x54a/0x12a0 [ 3031.624851] exc_page_fault+0xa2/0x1a0 [ 3031.624877] ? asm_exc_page_fault+0x8/0x30 [ 3031.624904] asm_exc_page_fault+0x1e/0x30 [ 3031.624929] RIP: 0033:0x7f53cbb6b08c [ 3031.624952] Code: Unable to access opcode bytes at RIP 0x7f53cbb6b062. [ 3031.624961] RSP: 002b:00007f53cb1074d0 EFLAGS: 00010246 [ 3031.624975] RAX: 000000000000138b RBX: 0000000000000000 RCX: 00007f53cbb6b08c [ 3031.624988] RDX: 0000000000001fa0 RSI: 00007f53cb107d00 RDI: 0000000000000005 [ 3031.624999] RBP: 0000562dfd2a64c0 R08: 0000000000000000 R09: 0000562dfd2a2e88 [ 3031.625011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f53cb107d00 [ 3031.625023] R13: 0000000000001fa0 R14: 00007f53cb107d00 R15: 00007f53cb107d43 [ 3031.625060] [ 3031.625124] Mem-Info: [ 3031.625130] active_anon:23678 inactive_anon:46859 isolated_anon:11 [ 3031.625130] active_file:14 inactive_file:26 isolated_file:0 [ 3031.625130] unevictable:0 dirty:0 writeback:0 [ 3031.625130] slab_reclaimable:7485 slab_unreclaimable:62348 [ 3031.625130] mapped:69638 shmem:109 pagetables:1007 bounce:0 [ 3031.625130] kernel_misc_reclaimable:0 [ 3031.625130] free:2844 free_pcp:180 free_cma:0 [ 3031.625178] Node 0 active_anon:94712kB inactive_anon:187436kB active_file:56kB inactive_file:104kB unevictable:0kB isolated(anon):44kB isolated(file):0kB mapped:278552kB dirty:0kB writeback:0kB shmem:436kB writeback_tmp:0kB kernel_stack:4128kB pagetables:4028kB all_unreclaimable? yes [ 3031.625218] Node 0 DMA free:6480kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3031.625271] lowmem_reserve[]: 0 1615 1615 1615 [ 3031.625294] Node 0 DMA32 free:4896kB boost:6144kB min:11264kB low:12916kB high:14568kB reserved_highatomic:2048KB active_anon:94712kB inactive_anon:187352kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:720kB local_pcp:472kB free_cma:0kB [ 3031.625368] lowmem_reserve[]: 0 0 0 0 [ 3031.625389] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6480kB [ 3031.625488] Node 0 DMA32: 225*4kB (MH) 55*8kB (UMEH) 30*16kB (UMH) 24*32kB (UMEH) 11*64kB (UMH) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 4572kB [ 3031.625598] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3031.625614] 139 total pagecache pages [ 3031.625621] 0 pages in swap cache [ 3031.625627] Swap cache stats: add 0, delete 0, find 0/0 [ 3031.625638] Free swap = 0kB [ 3031.625644] Total swap = 0kB [ 3031.625649] 524158 pages RAM [ 3031.625654] 0 pages HighMem/MovableOnly [ 3031.625661] 105733 pages reserved [ 3031.625667] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=in:imklog,pid=191,uid=0 [ 3031.626940] Out of memory (oom_kill_allocating_task): Killed process 186 (rsyslogd) total-vm:220876kB, anon-rss:1180kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0 [ 3031.629381] systemd-journal invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=-250 [ 3031.629413] CPU: 0 PID: 114 Comm: systemd-journal Not tainted 5.18.0-rc5-next-20220502 #1 [ 3031.629430] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3031.629442] Call Trace: [ 3031.629448] [ 3031.629455] dump_stack_lvl+0x8b/0xb3 [ 3031.629482] dump_header+0x10b/0x7e4 [ 3031.629514] oom_kill_process.cold+0x10/0x15 [ 3031.629544] out_of_memory+0x11e5/0x14a0 [ 3031.629576] ? oom_killer_disable+0x270/0x270 [ 3031.629608] __alloc_pages_slowpath.constprop.0+0x1972/0x1f10 [ 3031.629654] ? warn_alloc+0x190/0x190 [ 3031.629685] ? prepare_alloc_pages+0x371/0x500 [ 3031.629723] __alloc_pages+0x403/0x4e0 [ 3031.629742] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3031.629758] ? lock_is_held_type+0xd7/0x130 [ 3031.629789] ? __filemap_get_folio+0x2d4/0xfe0 [ 3031.629815] ? lock_downgrade+0x6d0/0x6d0 [ 3031.629837] ? lock_is_held_type+0xd7/0x130 [ 3031.629864] alloc_pages+0x1a0/0x2f0 [ 3031.629888] __filemap_get_folio+0x65f/0xfe0 [ 3031.629922] ? filemap_read+0xba0/0xba0 [ 3031.629964] filemap_fault+0x156a/0x2140 [ 3031.629999] ? __filemap_get_folio+0xfe0/0xfe0 [ 3031.630042] __do_fault+0x113/0x5a0 [ 3031.630070] __handle_mm_fault+0x13bc/0x3670 [ 3031.630101] ? lock_is_held_type+0xd7/0x130 [ 3031.630125] ? __pmd_alloc+0x680/0x680 [ 3031.630175] handle_mm_fault+0x2e6/0xa20 [ 3031.630203] do_user_addr_fault+0x54a/0x12a0 [ 3031.630239] exc_page_fault+0xa2/0x1a0 [ 3031.630262] ? asm_exc_page_fault+0x8/0x30 [ 3031.630286] asm_exc_page_fault+0x1e/0x30 [ 3031.630313] RIP: 0033:0x7fdb2941d116 [ 3031.630336] Code: Unable to access opcode bytes at RIP 0x7fdb2941d0ec. [ 3031.630344] RSP: 002b:00007ffc8c6d0070 EFLAGS: 00010293 [ 3031.630358] RAX: 0000000000000001 RBX: 000055c2b4970360 RCX: 00007fdb2941d116 [ 3031.630372] RDX: 0000000000000014 RSI: 000055c2b49768f0 RDI: 0000000000000008 [ 3031.630385] RBP: ffffffffffffffff R08: 0000000000000000 R09: 00007ffc8c794080 [ 3031.630397] R10: 00000000ffffffff R11: 0000000000000293 R12: 0000000000000001 [ 3031.630407] R13: 0000000000000014 R14: 0000000000000000 R15: 0000000000000000 [ 3031.630440] [ 3031.630490] Mem-Info: [ 3031.630496] active_anon:23678 inactive_anon:46859 isolated_anon:11 [ 3031.630496] active_file:14 inactive_file:26 isolated_file:0 [ 3031.630496] unevictable:0 dirty:0 writeback:0 [ 3031.630496] slab_reclaimable:7485 slab_unreclaimable:62348 [ 3031.630496] mapped:69638 shmem:109 pagetables:1007 bounce:0 [ 3031.630496] kernel_misc_reclaimable:0 [ 3031.630496] free:2844 free_pcp:180 free_cma:0 [ 3031.630540] Node 0 active_anon:94712kB inactive_anon:187436kB active_file:56kB inactive_file:104kB unevictable:0kB isolated(anon):44kB isolated(file):0kB mapped:278552kB dirty:0kB writeback:0kB shmem:436kB writeback_tmp:0kB kernel_stack:4064kB pagetables:4028kB all_unreclaimable? yes [ 3031.630581] Node 0 DMA free:6480kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3031.630625] lowmem_reserve[]: 0 1615 1615 1615 [ 3031.630645] Node 0 DMA32 free:4896kB boost:6144kB min:11264kB low:12916kB high:14568kB reserved_highatomic:2048KB active_anon:94712kB inactive_anon:187352kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:720kB local_pcp:248kB free_cma:0kB [ 3031.630692] lowmem_reserve[]: 0 0 0 0 [ 3031.630710] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6480kB [ 3031.630800] Node 0 DMA32: 225*4kB (MH) 55*8kB (UMEH) 30*16kB (UMH) 24*32kB (UMEH) 11*64kB (UMH) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 4572kB [ 3031.630895] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3031.630908] 139 total pagecache pages [ 3031.630913] 0 pages in swap cache [ 3031.630918] Swap cache stats: add 0, delete 0, find 0/0 [ 3031.630927] Free swap = 0kB [ 3031.630932] Total swap = 0kB [ 3031.630936] 524158 pages RAM [ 3031.630941] 0 pages HighMem/MovableOnly [ 3031.630945] 105733 pages reserved [ 3031.630950] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=systemd-journal,pid=114,uid=0 [ 3031.631243] Out of memory (oom_kill_allocating_task): Killed process 114 (systemd-journal) total-vm:31948kB, anon-rss:860kB, file-rss:0kB, shmem-rss:4kB, UID:0 pgtables:84kB oom_score_adj:-250 [ 3031.697862] systemd-journal: page allocation failure: order:0, mode:0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0 [ 3031.697968] CPU: 0 PID: 114 Comm: systemd-journal Not tainted 5.18.0-rc5-next-20220502 #1 [ 3031.697987] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3031.697997] Call Trace: [ 3031.698001] [ 3031.698008] dump_stack_lvl+0x8b/0xb3 [ 3031.698032] warn_alloc.cold+0x95/0x18a [ 3031.698052] ? zone_watermark_ok_safe+0x240/0x240 [ 3031.698071] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3031.698097] ? __alloc_pages_slowpath.constprop.0+0xcc9/0x1f10 [ 3031.698118] ? oom_killer_disable+0x270/0x270 [ 3031.698148] __alloc_pages_slowpath.constprop.0+0x1a21/0x1f10 [ 3031.698189] ? warn_alloc+0x190/0x190 [ 3031.698217] ? prepare_alloc_pages+0x371/0x500 [ 3031.698249] __alloc_pages+0x403/0x4e0 [ 3031.698266] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3031.698283] ? lock_is_held_type+0xd7/0x130 [ 3031.698319] ? __filemap_get_folio+0x2d4/0xfe0 [ 3031.698344] ? lock_downgrade+0x6d0/0x6d0 [ 3031.698373] ? lock_is_held_type+0xd7/0x130 [ 3031.698402] alloc_pages+0x1a0/0x2f0 [ 3031.698427] __filemap_get_folio+0x65f/0xfe0 [ 3031.698464] ? filemap_read+0xba0/0xba0 [ 3031.698509] filemap_fault+0x156a/0x2140 [ 3031.698547] ? __filemap_get_folio+0xfe0/0xfe0 [ 3031.698592] __do_fault+0x113/0x5a0 [ 3031.698618] __handle_mm_fault+0x13bc/0x3670 [ 3031.698646] ? lock_is_held_type+0xd7/0x130 [ 3031.698678] ? __pmd_alloc+0x680/0x680 [ 3031.698729] handle_mm_fault+0x2e6/0xa20 [ 3031.698758] do_user_addr_fault+0x54a/0x12a0 [ 3031.698793] exc_page_fault+0xa2/0x1a0 [ 3031.698816] ? asm_exc_page_fault+0x8/0x30 [ 3031.698840] asm_exc_page_fault+0x1e/0x30 [ 3031.698862] RIP: 0033:0x7fdb2941d116 [ 3031.698882] Code: Unable to access opcode bytes at RIP 0x7fdb2941d0ec. [ 3031.698890] RSP: 002b:00007ffc8c6d0070 EFLAGS: 00010293 [ 3031.698902] RAX: 0000000000000001 RBX: 000055c2b4970360 RCX: 00007fdb2941d116 [ 3031.698913] RDX: 0000000000000014 RSI: 000055c2b49768f0 RDI: 0000000000000008 [ 3031.698924] RBP: ffffffffffffffff R08: 0000000000000000 R09: 00007ffc8c794080 [ 3031.698935] R10: 00000000ffffffff R11: 0000000000000293 R12: 0000000000000001 [ 3031.698949] R13: 0000000000000014 R14: 0000000000000000 R15: 0000000000000000 [ 3031.698980] [ 3031.699029] Mem-Info: [ 3031.699034] active_anon:23678 inactive_anon:46859 isolated_anon:11 [ 3031.699034] active_file:14 inactive_file:26 isolated_file:0 [ 3031.699034] unevictable:0 dirty:0 writeback:0 [ 3031.699034] slab_reclaimable:7485 slab_unreclaimable:62348 [ 3031.699034] mapped:69638 shmem:109 pagetables:1007 bounce:0 [ 3031.699034] kernel_misc_reclaimable:0 [ 3031.699034] free:2844 free_pcp:202 free_cma:0 [ 3031.699076] Node 0 active_anon:94712kB inactive_anon:187436kB active_file:56kB inactive_file:104kB unevictable:0kB isolated(anon):44kB isolated(file):0kB mapped:278552kB dirty:0kB writeback:0kB shmem:436kB writeback_tmp:0kB kernel_stack:4032kB pagetables:4028kB all_unreclaimable? yes [ 3031.699113] Node 0 DMA free:6480kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3031.699159] lowmem_reserve[]: 0 1615 1615 1615 [ 3031.699179] Node 0 DMA32 free:4896kB boost:6144kB min:11264kB low:12916kB high:14568kB reserved_highatomic:2048KB active_anon:94712kB inactive_anon:187352kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:808kB local_pcp:312kB free_cma:0kB [ 3031.699226] lowmem_reserve[]: 0 0 0 0 [ 3031.699245] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6480kB [ 3031.699406] Node 0 DMA32: 225*4kB (MH) 55*8kB (UMEH) 30*16kB (UMH) 24*32kB (UMEH) 11*64kB (UMH) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 4572kB [ 3031.699511] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3031.699526] 139 total pagecache pages [ 3031.699531] 0 pages in swap cache [ 3031.699536] Swap cache stats: add 0, delete 0, find 0/0 [ 3031.699545] Free swap = 0kB [ 3031.699550] Total swap = 0kB [ 3031.699555] 524158 pages RAM [ 3031.699559] 0 pages HighMem/MovableOnly [ 3031.699564] 105733 pages reserved [ 3032.015670] systemd[1]: rsyslog.service: A process of this unit has been killed by the OOM killer. [ 3032.028834] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 3032.030547] systemd[1]: systemd-journald.service: Failed with result 'oom-kill'. [ 3032.073100] systemd[1]: systemd-journald.service: Consumed 7.806s CPU time. [ 3032.083543] systemd[1]: rsyslog.service: Main process exited, code=killed, status=9/KILL [ 3032.085433] systemd[1]: rsyslog.service: Failed with result 'oom-kill'. [ 3032.101400] systemd[1]: rsyslog.service: Consumed 2.078s CPU time. [ 3032.103489] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 3032.149683] systemd[1]: Stopping Flush Journal to Persistent Storage... [ 3032.288139] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 1. [ 3032.288227] systemd[1]: Stopped System Logging Service. [ 3032.288768] systemd[1]: rsyslog.service: Consumed 2.078s CPU time. [ 3032.374508] systemd[1]: Starting System Logging Service... [ 3032.838984] rsyslogd invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=0 [ 3032.839013] CPU: 1 PID: 12072 Comm: rsyslogd Not tainted 5.18.0-rc5-next-20220502 #1 [ 3032.839030] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3032.839041] Call Trace: [ 3032.839046] [ 3032.839053] dump_stack_lvl+0x8b/0xb3 [ 3032.839079] dump_header+0x10b/0x7e4 [ 3032.839112] oom_kill_process.cold+0x10/0x15 [ 3032.839141] out_of_memory+0x11e5/0x14a0 [ 3032.839171] ? oom_killer_disable+0x270/0x270 [ 3032.839203] __alloc_pages_slowpath.constprop.0+0x1972/0x1f10 [ 3032.839245] ? warn_alloc+0x190/0x190 [ 3032.839276] ? prepare_alloc_pages+0x371/0x500 [ 3032.839315] __alloc_pages+0x403/0x4e0 [ 3032.839332] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3032.839350] ? lock_is_held_type+0xd7/0x130 [ 3032.839384] ? __filemap_get_folio+0x2d4/0xfe0 [ 3032.839409] ? lock_downgrade+0x6d0/0x6d0 [ 3032.839430] ? lock_is_held_type+0xd7/0x130 [ 3032.839458] alloc_pages+0x1a0/0x2f0 [ 3032.839482] __filemap_get_folio+0x65f/0xfe0 [ 3032.839517] ? filemap_read+0xba0/0xba0 [ 3032.839561] filemap_fault+0x156a/0x2140 [ 3032.839597] ? __filemap_get_folio+0xfe0/0xfe0 [ 3032.839643] __do_fault+0x113/0x5a0 [ 3032.839670] __handle_mm_fault+0x13bc/0x3670 [ 3032.839704] ? lock_is_held_type+0xd7/0x130 [ 3032.839728] ? __pmd_alloc+0x680/0x680 [ 3032.839780] handle_mm_fault+0x2e6/0xa20 [ 3032.839809] do_user_addr_fault+0x54a/0x12a0 [ 3032.839844] exc_page_fault+0xa2/0x1a0 [ 3032.839867] ? asm_exc_page_fault+0x8/0x30 [ 3032.839898] asm_exc_page_fault+0x1e/0x30 [ 3032.839920] RIP: 0033:0x7f2573c1ae70 [ 3032.839939] Code: Unable to access opcode bytes at RIP 0x7f2573c1ae46. [ 3032.839946] RSP: 002b:00007fffdabb25d8 EFLAGS: 00010212 [ 3032.839958] RAX: 00007f25739354d8 RBX: 000000000d39ad3d RCX: 0000000000000001 [ 3032.839969] RDX: 00007f25737fc4b0 RSI: 00007f2573bc13d8 RDI: 00007f2573bc16d8 [ 3032.839980] RBP: 0000000000000001 R08: 0000000000000001 R09: 00007f257393ca20 [ 3032.839991] R10: 00007f2573c0bf20 R11: 0000000000000010 R12: 00007f2573934358 [ 3032.840002] R13: 00007f2573bc13d8 R14: 0000000000000001 R15: 00007f2573afc500 [ 3032.840034] [ 3032.840087] Mem-Info: [ 3032.840091] active_anon:23677 inactive_anon:46562 isolated_anon:0 [ 3032.840091] active_file:46 inactive_file:12 isolated_file:0 [ 3032.840091] unevictable:0 dirty:0 writeback:0 [ 3032.840091] slab_reclaimable:7469 slab_unreclaimable:61786 [ 3032.840091] mapped:69652 shmem:109 pagetables:957 bounce:0 [ 3032.840091] kernel_misc_reclaimable:0 [ 3032.840091] free:2957 free_pcp:4 free_cma:0 [ 3032.840135] Node 0 active_anon:94708kB inactive_anon:186248kB active_file:184kB inactive_file:48kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278608kB dirty:0kB writeback:0kB shmem:436kB writeback_tmp:0kB kernel_stack:4000kB pagetables:3828kB all_unreclaimable? no [ 3032.840172] Node 0 DMA free:6484kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:16kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3032.840217] lowmem_reserve[]: 0 1615 1615 1615 [ 3032.840237] Node 0 DMA32 free:5344kB boost:0kB min:5120kB low:6772kB high:8424kB reserved_highatomic:2048KB active_anon:94708kB inactive_anon:186232kB active_file:0kB inactive_file:84kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:16kB local_pcp:0kB free_cma:0kB [ 3032.840295] lowmem_reserve[]: 0 0 0 0 [ 3032.840333] Node 0 DMA: 3*4kB (UM) 1*8kB (M) 2*16kB (M) 3*32kB (UM) 3*64kB (UM) 0*128kB 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6484kB [ 3032.840441] Node 0 DMA32: 334*4kB (MH) 94*8kB (UMEH) 47*16kB (UMH) 30*32kB (UMEH) 9*64kB (UMH) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 5656kB [ 3032.840541] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3032.840555] 194 total pagecache pages [ 3032.840560] 0 pages in swap cache [ 3032.840565] Swap cache stats: add 0, delete 0, find 0/0 [ 3032.840575] Free swap = 0kB [ 3032.840579] Total swap = 0kB [ 3032.840584] 524158 pages RAM [ 3032.840589] 0 pages HighMem/MovableOnly [ 3032.840593] 105733 pages reserved [ 3032.840598] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=rsyslogd,pid=12072,uid=0 [ 3032.840679] Out of memory (oom_kill_allocating_task): Killed process 12072 (rsyslogd) total-vm:6908kB, anon-rss:368kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:52kB oom_score_adj:0 [ 3032.886436] journalctl invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=0 [ 3032.886465] CPU: 1 PID: 12071 Comm: journalctl Not tainted 5.18.0-rc5-next-20220502 #1 [ 3032.886483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3032.886494] Call Trace: [ 3032.886500] [ 3032.886506] dump_stack_lvl+0x8b/0xb3 [ 3032.886532] dump_header+0x10b/0x7e4 [ 3032.886565] oom_kill_process.cold+0x10/0x15 [ 3032.886598] out_of_memory+0x11e5/0x14a0 [ 3032.886630] ? oom_killer_disable+0x270/0x270 [ 3032.886663] __alloc_pages_slowpath.constprop.0+0x1972/0x1f10 [ 3032.886709] ? warn_alloc+0x190/0x190 [ 3032.886740] ? prepare_alloc_pages+0x371/0x500 [ 3032.886777] __alloc_pages+0x403/0x4e0 [ 3032.886796] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3032.886816] ? lock_is_held_type+0xd7/0x130 [ 3032.886849] ? __filemap_get_folio+0x2d4/0xfe0 [ 3032.886875] ? lock_downgrade+0x6d0/0x6d0 [ 3032.886896] ? lock_is_held_type+0xd7/0x130 [ 3032.886928] alloc_pages+0x1a0/0x2f0 [ 3032.886954] __filemap_get_folio+0x65f/0xfe0 [ 3032.886993] ? filemap_read+0xba0/0xba0 [ 3032.887039] filemap_fault+0x156a/0x2140 [ 3032.887076] ? __filemap_get_folio+0xfe0/0xfe0 [ 3032.887125] __do_fault+0x113/0x5a0 [ 3032.887151] __handle_mm_fault+0x13bc/0x3670 [ 3032.887178] ? lock_is_held_type+0xd7/0x130 [ 3032.887201] ? __pmd_alloc+0x680/0x680 [ 3032.887250] handle_mm_fault+0x2e6/0xa20 [ 3032.887276] do_user_addr_fault+0x54a/0x12a0 [ 3032.887318] exc_page_fault+0xa2/0x1a0 [ 3032.887342] ? asm_exc_page_fault+0x8/0x30 [ 3032.887365] asm_exc_page_fault+0x1e/0x30 [ 3032.887386] RIP: 0033:0x7f92fa50a4b0 [ 3032.887406] Code: Unable to access opcode bytes at RIP 0x7f92fa50a486. [ 3032.887413] RSP: 002b:00007ffdcbc94f18 EFLAGS: 00010206 [ 3032.887426] RAX: 0000564df2567d40 RBX: 00007ffdcbc95ab8 RCX: 0000000000000000 [ 3032.887437] RDX: 0000000000000001 RSI: 00007f92f984846c RDI: 0000000000000000 [ 3032.887448] RBP: 0000000000000002 R08: 00007f92fa3cd6a0 R09: 0000000000000000 [ 3032.887458] R10: 0008000000004007 R11: 0000000000000020 R12: 0000564df06a5740 [ 3032.887469] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3032.887498] [ 3032.887599] Mem-Info: [ 3032.887604] active_anon:23677 inactive_anon:46457 isolated_anon:0 [ 3032.887604] active_file:30 inactive_file:28 isolated_file:0 [ 3032.887604] unevictable:0 dirty:0 writeback:0 [ 3032.887604] slab_reclaimable:7469 slab_unreclaimable:61786 [ 3032.887604] mapped:69652 shmem:109 pagetables:957 bounce:0 [ 3032.887604] kernel_misc_reclaimable:0 [ 3032.887604] free:2961 free_pcp:22 free_cma:0 [ 3032.887649] Node 0 active_anon:94708kB inactive_anon:185828kB active_file:120kB inactive_file:112kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278608kB dirty:0kB writeback:0kB shmem:436kB writeback_tmp:0kB kernel_stack:3968kB pagetables:3828kB all_unreclaimable? no [ 3032.887688] Node 0 DMA free:6500kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3032.887736] lowmem_reserve[]: 0 1615 1615 1615 [ 3032.887756] Node 0 DMA32 free:5344kB boost:0kB min:5120kB low:6772kB high:8424kB reserved_highatomic:2048KB active_anon:94708kB inactive_anon:186232kB active_file:0kB inactive_file:84kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:88kB local_pcp:88kB free_cma:0kB [ 3032.887804] lowmem_reserve[]: 0 0 0 0 [ 3032.887825] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6500kB [ 3032.887926] Node 0 DMA32: 390*4kB (UMH) 106*8kB (UMEH) 48*16kB (UMH) 32*32kB (UMEH) 10*64kB (UMH) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 6120kB [ 3032.888034] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3032.888049] 194 total pagecache pages [ 3032.888054] 0 pages in swap cache [ 3032.888059] Swap cache stats: add 0, delete 0, find 0/0 [ 3032.888069] Free swap = 0kB [ 3032.888073] Total swap = 0kB [ 3032.888077] 524158 pages RAM [ 3032.888082] 0 pages HighMem/MovableOnly [ 3032.888086] 105733 pages reserved [ 3032.888090] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journal-flush.service,task=journalctl,pid=12071,uid=0 [ 3032.888163] Out of memory (oom_kill_allocating_task): Killed process 12071 (journalctl) total-vm:15048kB, anon-rss:628kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:64kB oom_score_adj:0 [ 3033.118448] syz-fuzzer invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=0 [ 3033.118476] CPU: 1 PID: 268 Comm: syz-fuzzer Not tainted 5.18.0-rc5-next-20220502 #1 [ 3033.118494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3033.118504] Call Trace: [ 3033.118509] [ 3033.118516] dump_stack_lvl+0x8b/0xb3 [ 3033.118540] dump_header+0x10b/0x7e4 [ 3033.118569] oom_kill_process.cold+0x10/0x15 [ 3033.118598] out_of_memory+0x11e5/0x14a0 [ 3033.118627] ? oom_killer_disable+0x270/0x270 [ 3033.118662] __alloc_pages_slowpath.constprop.0+0x1972/0x1f10 [ 3033.118711] ? warn_alloc+0x190/0x190 [ 3033.118746] ? prepare_alloc_pages+0x371/0x500 [ 3033.118784] __alloc_pages+0x403/0x4e0 [ 3033.118804] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3033.118823] ? lock_is_held_type+0xd7/0x130 [ 3033.118856] ? __filemap_get_folio+0x2d4/0xfe0 [ 3033.118882] ? lock_downgrade+0x6d0/0x6d0 [ 3033.118905] ? lock_is_held_type+0xd7/0x130 [ 3033.118934] alloc_pages+0x1a0/0x2f0 [ 3033.118959] __filemap_get_folio+0x65f/0xfe0 [ 3033.118994] ? filemap_read+0xba0/0xba0 [ 3033.119041] filemap_fault+0x156a/0x2140 [ 3033.119082] ? __filemap_get_folio+0xfe0/0xfe0 [ 3033.119128] __do_fault+0x113/0x5a0 [ 3033.119154] __handle_mm_fault+0x13bc/0x3670 [ 3033.119182] ? lock_is_held_type+0xd7/0x130 [ 3033.119206] ? __pmd_alloc+0x680/0x680 [ 3033.119253] handle_mm_fault+0x2e6/0xa20 [ 3033.119282] do_user_addr_fault+0x54a/0x12a0 [ 3033.119324] exc_page_fault+0xa2/0x1a0 [ 3033.119350] ? asm_exc_page_fault+0x8/0x30 [ 3033.119376] asm_exc_page_fault+0x1e/0x30 [ 3033.119398] RIP: 0033:0x466533 [ 3033.119418] Code: Unable to access opcode bytes at RIP 0x466509. [ 3033.119425] RSP: 002b:000000c00003fe80 EFLAGS: 00010202 [ 3033.119440] RAX: ffffffffffffff92 RBX: 000000003963c7f7 RCX: 0000000000466533 [ 3033.119452] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000001f20e78 [ 3033.119463] RBP: 000000c00003fec8 R08: 0000000000000000 R09: 0000000000000000 [ 3033.119474] R10: 000000c00003feb8 R11: 0000000000000202 R12: 0000000000438880 [ 3033.119484] R13: 0000000000000000 R14: 0000000000e5de2c R15: 0000000000000000 [ 3033.119515] [ 3033.119591] Mem-Info: [ 3033.119598] active_anon:23676 inactive_anon:46301 isolated_anon:0 [ 3033.119598] active_file:20 inactive_file:34 isolated_file:0 [ 3033.119598] unevictable:0 dirty:0 writeback:0 [ 3033.119598] slab_reclaimable:7469 slab_unreclaimable:61809 [ 3033.119598] mapped:69633 shmem:109 pagetables:939 bounce:0 [ 3033.119598] kernel_misc_reclaimable:0 [ 3033.119598] free:2535 free_pcp:63 free_cma:0 [ 3033.119645] Node 0 active_anon:94704kB inactive_anon:185204kB active_file:80kB inactive_file:136kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278532kB dirty:0kB writeback:0kB shmem:436kB writeback_tmp:0kB kernel_stack:3936kB pagetables:3756kB all_unreclaimable? yes [ 3033.119684] Node 0 DMA free:6484kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3033.119731] lowmem_reserve[]: 0 1615 1615 1615 [ 3033.119753] Node 0 DMA32 free:3656kB boost:4096kB min:9216kB low:10868kB high:12520kB reserved_highatomic:2048KB active_anon:94704kB inactive_anon:185204kB active_file:84kB inactive_file:136kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:252kB local_pcp:0kB free_cma:0kB [ 3033.119801] lowmem_reserve[]: 0 0 0 0 [ 3033.119822] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 3033.119919] Node 0 DMA32: 274*4kB (UMH) 70*8kB (UMEH) 21*16kB (UMH) 6*32kB (H) 3*64kB (H) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 3656kB [ 3033.120023] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3033.120038] 165 total pagecache pages [ 3033.120042] 0 pages in swap cache [ 3033.120047] Swap cache stats: add 0, delete 0, find 0/0 [ 3033.120057] Free swap = 0kB [ 3033.120062] Total swap = 0kB [ 3033.120067] 524158 pages RAM [ 3033.120071] 0 pages HighMem/MovableOnly [ 3033.120076] 105733 pages reserved [ 3033.120081] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=268,uid=0 [ 3033.120206] Out of memory (oom_kill_allocating_task): Killed process 266 (syz-fuzzer) total-vm:1170640kB, anon-rss:246468kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:808kB oom_score_adj:0 [ 3033.620213] oom_reaper: reaped process 12031 (syz-executor.2), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 3033.710249] systemd[1]: ssh.service: A process of this unit has been killed by the OOM killer. [ 3033.758153] systemd[1]: systemd-journal-flush.service: A process of this unit has been killed by the OOM killer. [ 3034.120873] systemd[1]: systemd-journal-flush.service: Control process exited, code=killed, status=9/KILL [ 3034.127926] systemd[1]: systemd-journal-flush.service: Failed with result 'oom-kill'. [ 3034.170465] systemd[1]: Stopped Flush Journal to Persistent Storage. [ 3034.190192] systemd[1]: rsyslog.service: Main process exited, code=killed, status=9/KILL [ 3034.195457] systemd[1]: rsyslog.service: Failed with result 'signal'. [ 3034.232866] systemd[1]: Failed to start System Logging Service. [ 3034.267425] systemd[1]: Stopped Journal Service. [ 3034.267795] systemd[1]: systemd-journald.service: Consumed 7.806s CPU time. [ 3034.837861] oom_reaper: reaped process 12028 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 3034.856823] kworker/u4:3 invoked oom-killer: gfp_mask=0xc2cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_COMP|__GFP_NOMEMALLOC), order=1, oom_score_adj=0 [ 3034.856864] CPU: 0 PID: 47 Comm: kworker/u4:3 Not tainted 5.18.0-rc5-next-20220502 #1 [ 3034.856887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3034.856902] Workqueue: netns cleanup_net [ 3034.856932] Call Trace: [ 3034.856938] [ 3034.856945] dump_stack_lvl+0x8b/0xb3 [ 3034.856968] dump_header+0x10b/0x7e4 [ 3034.857000] oom_kill_process.cold+0x10/0x15 [ 3034.857033] out_of_memory+0x358/0x14a0 [ 3034.857068] ? oom_killer_disable+0x270/0x270 [ 3034.857094] ? lock_is_held_type+0xd7/0x130 [ 3034.857128] __alloc_pages_slowpath.constprop.0+0x1972/0x1f10 [ 3034.857178] ? warn_alloc+0x190/0x190 [ 3034.857214] ? prepare_alloc_pages+0x371/0x500 [ 3034.857239] ? lock_is_held_type+0xd7/0x130 [ 3034.857272] __alloc_pages+0x403/0x4e0 [ 3034.857292] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3034.857321] ? lock_is_held_type+0xd7/0x130 [ 3034.857355] ? lock_release+0x3b2/0x750 [ 3034.857377] ? __slab_alloc.constprop.0+0x45/0x80 [ 3034.857414] alloc_pages+0x1a0/0x2f0 [ 3034.857433] ? mark_held_locks+0x9e/0xe0 [ 3034.857456] allocate_slab+0x249/0x300 [ 3034.857487] ___slab_alloc+0xa09/0xe50 [ 3034.857516] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 3034.857547] ? lock_is_held_type+0xd7/0x130 [ 3034.857576] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 3034.857594] __slab_alloc.constprop.0+0x45/0x80 [ 3034.857627] __kmalloc_node_track_caller+0x19a/0x440 [ 3034.857655] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 3034.857682] __alloc_skb+0xe3/0x340 [ 3034.857710] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 3034.857738] rtmsg_ifinfo+0x83/0x120 [ 3034.857762] dev_close_many+0x236/0x450 [ 3034.857789] ? __dev_close_many+0x2f0/0x2f0 [ 3034.857810] ? lockdep_hardirqs_on+0x79/0x100 [ 3034.857848] dev_close+0x136/0x1c0 [ 3034.857872] ? netdev_state_change+0x130/0x130 [ 3034.857900] ? __mutex_lock+0x231/0x14c0 [ 3034.857926] cfg80211_shutdown_all_interfaces+0x96/0x1f0 [ 3034.857955] ieee80211_remove_interfaces+0xe3/0x690 [ 3034.857981] ? ieee80211_sdata_stop+0x90/0x90 [ 3034.858018] ieee80211_unregister_hw+0x47/0x1f0 [ 3034.858037] hwsim_exit_net+0x49a/0xb90 [ 3034.858065] ? hwsim_register_received_nl+0x410/0x410 [ 3034.858089] ? sit_exit_batch_net+0x504/0x720 [ 3034.858118] ? lock_is_held_type+0xd7/0x130 [ 3034.858149] ? hwsim_register_received_nl+0x410/0x410 [ 3034.858176] ops_exit_list+0xb3/0x180 [ 3034.858208] cleanup_net+0x484/0x9e0 [ 3034.858238] ? unregister_pernet_device+0x70/0x70 [ 3034.858268] ? lock_is_held_type+0xd7/0x130 [ 3034.858300] process_one_work+0xa1c/0x16a0 [ 3034.858341] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 3034.858373] ? rwlock_bug.part.0+0x90/0x90 [ 3034.858394] ? _raw_spin_lock_irq+0x41/0x50 [ 3034.858428] worker_thread+0x637/0x1250 [ 3034.858472] ? process_one_work+0x16a0/0x16a0 [ 3034.858501] kthread+0x2f2/0x3b0 [ 3034.858518] ? kthread_complete_and_exit+0x40/0x40 [ 3034.858544] ret_from_fork+0x22/0x30 [ 3034.858588] [ 3034.858716] Mem-Info: [ 3034.858722] active_anon:46 inactive_anon:7263 isolated_anon:0 [ 3034.858722] active_file:6 inactive_file:0 isolated_file:0 [ 3034.858722] unevictable:0 dirty:0 writeback:0 [ 3034.858722] slab_reclaimable:7440 slab_unreclaimable:58753 [ 3034.858722] mapped:17417 shmem:94 pagetables:318 bounce:0 [ 3034.858722] kernel_misc_reclaimable:0 [ 3034.858722] free:2368 free_pcp:177 free_cma:0 [ 3034.858767] Node 0 active_anon:184kB inactive_anon:29052kB active_file:24kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:69668kB dirty:0kB writeback:0kB shmem:376kB writeback_tmp:0kB kernel_stack:3232kB pagetables:1272kB all_unreclaimable? no [ 3034.858806] Node 0 DMA free:6480kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3034.858857] lowmem_reserve[]: 0 1615 1615 1615 [ 3034.858880] Node 0 DMA32 free:2992kB boost:0kB min:5120kB low:6772kB high:8424kB reserved_highatomic:2048KB active_anon:184kB inactive_anon:29576kB active_file:168kB inactive_file:356kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:708kB local_pcp:708kB free_cma:0kB [ 3034.858930] lowmem_reserve[]: 0 0 0 0 [ 3034.858952] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6480kB [ 3034.859091] Node 0 DMA32: 109*4kB (UMEH) 81*8kB (MEH) 19*16kB (MH) 9*32kB (UMH) 6*64kB (UH) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 3340kB [ 3034.859198] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3034.859214] 126 total pagecache pages [ 3034.859219] 0 pages in swap cache [ 3034.859224] Swap cache stats: add 0, delete 0, find 0/0 [ 3034.859235] Free swap = 0kB [ 3034.859240] Total swap = 0kB [ 3034.859245] 524158 pages RAM [ 3034.859250] 0 pages HighMem/MovableOnly [ 3034.859255] 105733 pages reserved [ 3034.859262] Unreclaimable slab info: [ 3034.859266] Name Used Total [ 3034.859333] pid_3 3KB 3KB [ 3034.859346] pid_2 34KB 37KB [ 3034.859357] IEEE-802.15.4-MAC 31KB 31KB [ 3034.859368] IEEE-802.15.4-RAW 63KB 63KB [ 3034.859383] fib6_nodes 24KB 24KB [ 3034.859393] ip6_dst_cache 45KB 45KB [ 3034.859404] PINGv6 31KB 31KB [ 3034.859415] RAWv6 157KB 157KB [ 3034.859426] UDPLITEv6 31KB 31KB [ 3034.859437] UDPv6 62KB 62KB [ 3034.859450] TCPv6 62KB 62KB [ 3034.859467] scsi_sense_cache 8KB 8KB [ 3034.859479] virtio_scsi_cmd 16KB 16KB [ 3034.859490] bio-120 7KB 7KB [ 3034.859511] sgpool-128 89KB 89KB [ 3034.859522] sgpool-64 63KB 63KB [ 3034.859533] sgpool-32 204KB 204KB [ 3034.859543] sgpool-16 97KB 97KB [ 3034.859554] sgpool-8 60KB 60KB [ 3034.859564] mqueue_inode_cache 60KB 60KB [ 3034.859575] nfs_commit_data 15KB 15KB [ 3034.859587] nfs_write_data 47KB 47KB [ 3034.859601] jbd2_inode 11KB 11KB [ 3034.859612] ext4_system_zone 3KB 3KB [ 3034.859623] ext4_io_end_vec 7KB 7KB [ 3034.859634] ext4_bio_post_read_ctx 15KB 15KB [ 3034.859653] fasync_cache 7KB 7KB [ 3034.859665] pid_namespace 7KB 7KB [ 3034.859677] rpc_buffers 31KB 31KB [ 3034.859688] rpc_tasks 3KB 3KB [ 3034.859699] UNIX-STREAM 222KB 352KB [ 3034.859710] UNIX 198KB 288KB [ 3034.859724] UDP-Lite 63KB 63KB [ 3034.859734] tcp_bind_bucket 8KB 8KB [ 3034.859748] ip_fib_trie 8KB 8KB [ 3034.859758] ip_fib_alias 11KB 11KB [ 3034.859769] ip_dst_cache 8KB 8KB [ 3034.859781] RAW 31KB 31KB [ 3034.859791] UDP 175KB 252KB [ 3034.859804] request_sock_TCP 15KB 15KB [ 3034.859816] TCP 60KB 60KB [ 3034.859829] hugetlbfs_inode_cache 31KB 31KB [ 3034.859842] bio-248 11KB 11KB [ 3034.859855] ep_head 8KB 8KB [ 3034.859867] eventpoll_pwq 23KB 23KB [ 3034.859880] eventpoll_epi 47KB 47KB [ 3034.859893] inotify_inode_mark 46KB 46KB [ 3034.859907] request_queue 63KB 63KB [ 3034.859921] blkdev_ioc 8KB 8KB [ 3034.859933] bio-184 36KB 36KB [ 3034.859947] biovec-max 684KB 922KB [ 3034.859962] biovec-64 330KB 330KB [ 3034.859975] biovec-16 30KB 30KB [ 3034.859990] uid_cache 7KB 7KB [ 3034.860002] dmaengine-unmap-2 4KB 4KB [ 3034.860012] audit_buffer 7KB 7KB [ 3034.860024] skbuff_fclone_cache 60KB 60KB [ 3034.860042] skbuff_head_cache 673KB 802KB [ 3034.860054] file_lock_cache 39KB 39KB [ 3034.860064] file_lock_ctx 7KB 7KB [ 3034.860074] fsnotify_mark_connector 28KB 28KB [ 3034.860086] taskstats 30KB 30KB [ 3034.860096] proc_dir_entry 386KB 386KB [ 3034.860106] pde_opener 27KB 27KB [ 3034.860116] seq_file 56KB 56KB [ 3034.860127] sigqueue 11KB 31KB [ 3034.860138] shmem_inode_cache 1361KB 1454KB [ 3034.860149] kernfs_iattrs_cache 254KB 254KB [ 3034.860162] kernfs_node_cache 5215KB 5245KB [ 3034.860174] mnt_cache 157KB 157KB [ 3034.860186] filp 1476KB 1552KB [ 3034.860199] names_cache 10544KB 10680KB [ 3034.860209] net_namespace 80KB 80KB [ 3034.860218] hashtab_node 274KB 274KB [ 3034.860229] ebitmap_node 1149KB 1149KB [ 3034.860241] avtab_node 4976KB 4976KB [ 3034.860257] avc_node 31KB 31KB [ 3034.860283] lsm_inode_cache 2639KB 2996KB [ 3034.860335] lsm_file_cache 83KB 124KB [ 3034.860346] key_jar 31KB 31KB [ 3034.860357] uts_namespace 15KB 15KB [ 3034.860369] nsproxy 7KB 7KB [ 3034.860386] vm_area_struct 954KB 1064KB [ 3034.860398] mm_struct 246KB 283KB [ 3034.860408] fs_cache 40KB 40KB [ 3034.860419] files_cache 137KB 159KB [ 3034.860431] signal_cache 268KB 394KB [ 3034.860442] sighand_cache 328KB 360KB [ 3034.860454] task_struct 1147KB 1188KB [ 3034.860466] cred_jar 103KB 148KB [ 3034.860478] anon_vma_chain 190KB 212KB [ 3034.860490] anon_vma 169KB 188KB [ 3034.860502] pid 61KB 71KB [ 3034.860516] Acpi-Operand 83KB 142KB [ 3034.860527] Acpi-ParseExt 31KB 31KB [ 3034.860538] Acpi-Parse 31KB 47KB [ 3034.860549] Acpi-State 43KB 59KB [ 3034.860560] Acpi-Namespace 28KB 28KB [ 3034.860572] numa_policy 3KB 3KB [ 3034.860583] perf_event 94KB 189KB [ 3034.860594] trace_event_file 175KB 175KB [ 3034.860604] ftrace_event_field 304KB 304KB [ 3034.860615] pool_workqueue 40KB 40KB [ 3034.860627] task_group 16KB 16KB [ 3034.860638] vmap_area 42KB 43KB [ 3034.860650] page->ptl 134KB 157KB [ 3034.860661] kmemleak_scan_area 23KB 23KB [ 3034.861195] kmemleak_object 129775KB 147614KB [ 3034.861225] kmalloc-cg-8k 96KB 96KB [ 3034.861235] kmalloc-cg-4k 1120KB 1120KB [ 3034.861247] kmalloc-cg-2k 612KB 704KB [ 3034.861258] kmalloc-cg-1k 280KB 320KB [ 3034.861270] kmalloc-cg-512 245KB 256KB [ 3034.861280] kmalloc-cg-256 16KB 16KB [ 3034.861291] kmalloc-cg-192 28KB 28KB [ 3034.861302] kmalloc-cg-128 20KB 20KB [ 3034.861336] kmalloc-cg-96 24KB 24KB [ 3034.861346] kmalloc-cg-64 20KB 20KB [ 3034.861358] kmalloc-cg-32 45KB 72KB [ 3034.861369] kmalloc-cg-16 8KB 8KB [ 3034.861379] kmalloc-cg-8 15KB 15KB [ 3034.861389] kmalloc-8k 5632KB 5632KB [ 3034.861400] kmalloc-4k 6584KB 6584KB [ 3034.861414] kmalloc-2k 4324KB 4608KB [ 3034.861426] kmalloc-1k 4476KB 4832KB [ 3034.861445] kmalloc-512 3342KB 4064KB [ 3034.861456] kmalloc-256 1147KB 1160KB [ 3034.861470] kmalloc-192 622KB 688KB [ 3034.861488] kmalloc-128 362KB 500KB [ 3034.861508] kmalloc-96 338KB 528KB [ 3034.861532] kmalloc-64 1113KB 1356KB [ 3034.861548] kmalloc-32 488KB 568KB [ 3034.861560] kmalloc-16 319KB 328KB [ 3034.861572] kmalloc-8 261KB 262KB [ 3034.861583] kmem_cache_node 51KB 51KB [ 3034.861594] kmem_cache 78KB 78KB [ 3034.861604] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-udevd.service,task=systemd-udevd,pid=12065,uid=0 [ 3034.862549] Out of memory: Killed process 12065 (systemd-udevd) total-vm:35756kB, anon-rss:10208kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0 [ 3034.935533] kworker/u4:3 invoked oom-killer: gfp_mask=0xc2cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_COMP|__GFP_NOMEMALLOC), order=1, oom_score_adj=0 [ 3034.935565] CPU: 0 PID: 47 Comm: kworker/u4:3 Not tainted 5.18.0-rc5-next-20220502 #1 [ 3034.935583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3034.935595] Workqueue: netns cleanup_net [ 3034.935623] Call Trace: [ 3034.935628] [ 3034.935637] dump_stack_lvl+0x8b/0xb3 [ 3034.935659] dump_header+0x10b/0x7e4 [ 3034.935689] oom_kill_process.cold+0x10/0x15 [ 3034.935720] out_of_memory+0x358/0x14a0 [ 3034.935752] ? oom_killer_disable+0x270/0x270 [ 3034.935775] ? lock_is_held_type+0xd7/0x130 [ 3034.935807] __alloc_pages_slowpath.constprop.0+0x1972/0x1f10 [ 3034.935858] ? warn_alloc+0x190/0x190 [ 3034.935892] ? prepare_alloc_pages+0x371/0x500 [ 3034.935917] ? lock_is_held_type+0xd7/0x130 [ 3034.935954] __alloc_pages+0x403/0x4e0 [ 3034.935976] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3034.936006] ? lock_is_held_type+0xd7/0x130 [ 3034.936046] ? lock_release+0x3b2/0x750 [ 3034.936072] ? __slab_alloc.constprop.0+0x45/0x80 [ 3034.936117] alloc_pages+0x1a0/0x2f0 [ 3034.936139] ? mark_held_locks+0x9e/0xe0 [ 3034.936166] allocate_slab+0x249/0x300 [ 3034.936195] ___slab_alloc+0xa09/0xe50 [ 3034.936223] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 3034.936254] ? lock_is_held_type+0xd7/0x130 [ 3034.936284] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 3034.936326] __slab_alloc.constprop.0+0x45/0x80 [ 3034.936358] __kmalloc_node_track_caller+0x19a/0x440 [ 3034.936385] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 3034.936410] __alloc_skb+0xe3/0x340 [ 3034.936435] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 3034.936464] rtmsg_ifinfo+0x83/0x120 [ 3034.936489] dev_close_many+0x236/0x450 [ 3034.936510] ? __dev_close_many+0x2f0/0x2f0 [ 3034.936536] ? lockdep_hardirqs_on+0x79/0x100 [ 3034.936571] dev_close+0x136/0x1c0 [ 3034.936593] ? netdev_state_change+0x130/0x130 [ 3034.936620] ? __mutex_lock+0x231/0x14c0 [ 3034.936643] cfg80211_shutdown_all_interfaces+0x96/0x1f0 [ 3034.936671] ieee80211_remove_interfaces+0xe3/0x690 [ 3034.936698] ? ieee80211_sdata_stop+0x90/0x90 [ 3034.936735] ieee80211_unregister_hw+0x47/0x1f0 [ 3034.936753] hwsim_exit_net+0x49a/0xb90 [ 3034.936780] ? hwsim_register_received_nl+0x410/0x410 [ 3034.936805] ? sit_exit_batch_net+0x504/0x720 [ 3034.936832] ? lock_is_held_type+0xd7/0x130 [ 3034.936866] ? hwsim_register_received_nl+0x410/0x410 [ 3034.936890] ops_exit_list+0xb3/0x180 [ 3034.936917] cleanup_net+0x484/0x9e0 [ 3034.936943] ? unregister_pernet_device+0x70/0x70 [ 3034.936970] ? lock_is_held_type+0xd7/0x130 [ 3034.936999] process_one_work+0xa1c/0x16a0 [ 3034.937042] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 3034.937074] ? rwlock_bug.part.0+0x90/0x90 [ 3034.937096] ? _raw_spin_lock_irq+0x41/0x50 [ 3034.937131] worker_thread+0x637/0x1250 [ 3034.937171] ? process_one_work+0x16a0/0x16a0 [ 3034.937197] kthread+0x2f2/0x3b0 [ 3034.937214] ? kthread_complete_and_exit+0x40/0x40 [ 3034.937237] ret_from_fork+0x22/0x30 [ 3034.937277] [ 3034.937335] Mem-Info: [ 3034.937341] active_anon:46 inactive_anon:7137 isolated_anon:0 [ 3034.937341] active_file:25 inactive_file:15 isolated_file:0 [ 3034.937341] unevictable:0 dirty:0 writeback:0 [ 3034.937341] slab_reclaimable:7440 slab_unreclaimable:58753 [ 3034.937341] mapped:17417 shmem:94 pagetables:318 bounce:0 [ 3034.937341] kernel_misc_reclaimable:0 [ 3034.937341] free:2368 free_pcp:272 free_cma:0 [ 3034.937382] Node 0 active_anon:184kB inactive_anon:28548kB active_file:100kB inactive_file:60kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:69668kB dirty:0kB writeback:0kB shmem:376kB writeback_tmp:0kB kernel_stack:3232kB pagetables:1272kB all_unreclaimable? yes [ 3034.937417] Node 0 DMA free:6480kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3034.937467] lowmem_reserve[]: 0 1615 1615 1615 [ 3034.937489] Node 0 DMA32 free:2992kB boost:0kB min:5120kB low:6772kB high:8424kB reserved_highatomic:2048KB active_anon:184kB inactive_anon:29072kB active_file:168kB inactive_file:356kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:1088kB local_pcp:304kB free_cma:0kB [ 3034.937539] lowmem_reserve[]: 0 0 0 0 [ 3034.937560] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6480kB [ 3034.937660] Node 0 DMA32: 93*4kB (MEH) 68*8kB (MEH) 16*16kB (MH) 6*32kB (H) 3*64kB (H) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 2836kB [ 3034.937763] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3034.937777] 126 total pagecache pages [ 3034.937782] 0 pages in swap cache [ 3034.937787] Swap cache stats: add 0, delete 0, find 0/0 [ 3034.937796] Free swap = 0kB [ 3034.937801] Total swap = 0kB [ 3034.937805] 524158 pages RAM [ 3034.937810] 0 pages HighMem/MovableOnly [ 3034.937815] 105733 pages reserved [ 3034.937821] Unreclaimable slab info: [ 3034.937825] Name Used Total [ 3034.937832] pid_3 3KB 3KB [ 3034.937842] pid_2 34KB 37KB [ 3034.937852] IEEE-802.15.4-MAC 31KB 31KB [ 3034.937863] IEEE-802.15.4-RAW 63KB 63KB [ 3034.937877] fib6_nodes 24KB 24KB [ 3034.937887] ip6_dst_cache 45KB 45KB [ 3034.937897] PINGv6 31KB 31KB [ 3034.937907] RAWv6 157KB 157KB [ 3034.937918] UDPLITEv6 31KB 31KB [ 3034.937929] UDPv6 62KB 62KB [ 3034.937941] TCPv6 62KB 62KB [ 3034.937956] scsi_sense_cache 8KB 8KB [ 3034.937970] virtio_scsi_cmd 16KB 16KB [ 3034.937982] bio-120 7KB 7KB [ 3034.938004] sgpool-128 89KB 89KB [ 3034.938017] sgpool-64 63KB 63KB [ 3034.938027] sgpool-32 204KB 204KB [ 3034.938038] sgpool-16 97KB 97KB [ 3034.938048] sgpool-8 60KB 60KB [ 3034.938059] mqueue_inode_cache 60KB 60KB [ 3034.938070] nfs_commit_data 15KB 15KB [ 3034.938080] nfs_write_data 47KB 47KB [ 3034.938093] jbd2_inode 11KB 11KB [ 3034.938105] ext4_system_zone 3KB 3KB [ 3034.938114] ext4_io_end_vec 7KB 7KB [ 3034.938124] ext4_bio_post_read_ctx 15KB 15KB [ 3034.938140] fasync_cache 7KB 7KB [ 3034.938150] pid_namespace 7KB 7KB [ 3034.938160] rpc_buffers 31KB 31KB [ 3034.938170] rpc_tasks 3KB 3KB [ 3034.938180] UNIX-STREAM 222KB 352KB [ 3034.938191] UNIX 198KB 288KB [ 3034.938202] UDP-Lite 63KB 63KB [ 3034.938212] tcp_bind_bucket 8KB 8KB [ 3034.938225] ip_fib_trie 8KB 8KB [ 3034.938235] ip_fib_alias 11KB 11KB [ 3034.938245] ip_dst_cache 8KB 8KB [ 3034.938255] RAW 31KB 31KB [ 3034.938265] UDP 175KB 252KB [ 3034.938276] request_sock_TCP 15KB 15KB [ 3034.938287] TCP 60KB 60KB [ 3034.938297] hugetlbfs_inode_cache 31KB 31KB [ 3034.938354] bio-248 11KB 11KB [ 3034.938366] ep_head 8KB 8KB [ 3034.938376] eventpoll_pwq 23KB 23KB [ 3034.938387] eventpoll_epi 47KB 47KB [ 3034.938397] inotify_inode_mark 46KB 46KB [ 3034.938409] request_queue 63KB 63KB [ 3034.938420] blkdev_ioc 8KB 8KB [ 3034.938430] bio-184 36KB 36KB [ 3034.938441] biovec-max 684KB 922KB [ 3034.938453] biovec-64 330KB 330KB [ 3034.938463] biovec-16 30KB 30KB [ 3034.938474] uid_cache 7KB 7KB [ 3034.938485] dmaengine-unmap-2 4KB 4KB [ 3034.938495] audit_buffer 7KB 7KB [ 3034.938505] skbuff_fclone_cache 60KB 60KB [ 3034.938523] skbuff_head_cache 673KB 802KB [ 3034.938533] file_lock_cache 39KB 39KB [ 3034.938543] file_lock_ctx 7KB 7KB [ 3034.938553] fsnotify_mark_connector 28KB 28KB [ 3034.938564] taskstats 30KB 30KB [ 3034.938574] proc_dir_entry 386KB 386KB [ 3034.938583] pde_opener 27KB 27KB [ 3034.938593] seq_file 56KB 56KB [ 3034.938603] sigqueue 11KB 31KB [ 3034.938614] shmem_inode_cache 1361KB 1454KB [ 3034.938624] kernfs_iattrs_cache 254KB 254KB [ 3034.938637] kernfs_node_cache 5215KB 5245KB [ 3034.938647] mnt_cache 157KB 157KB [ 3034.938660] filp 1476KB 1552KB [ 3034.938672] names_cache 10544KB 10680KB [ 3034.938683] net_namespace 80KB 80KB [ 3034.938694] hashtab_node 274KB 274KB [ 3034.938705] ebitmap_node 1149KB 1149KB [ 3034.938716] avtab_node 4976KB 4976KB [ 3034.938730] avc_node 31KB 31KB [ 3034.938756] lsm_inode_cache 2639KB 2996KB [ 3034.938768] lsm_file_cache 83KB 124KB [ 3034.938779] key_jar 31KB 31KB [ 3034.938790] uts_namespace 15KB 15KB [ 3034.938801] nsproxy 7KB 7KB [ 3034.938817] vm_area_struct 954KB 1064KB [ 3034.938828] mm_struct 246KB 283KB [ 3034.938838] fs_cache 40KB 40KB [ 3034.938849] files_cache 137KB 159KB [ 3034.938860] signal_cache 268KB 394KB [ 3034.938871] sighand_cache 328KB 360KB [ 3034.938882] task_struct 1147KB 1188KB [ 3034.938895] cred_jar 103KB 148KB [ 3034.938906] anon_vma_chain 190KB 212KB [ 3034.938918] anon_vma 165KB 188KB [ 3034.938929] pid 61KB 71KB [ 3034.938941] Acpi-Operand 83KB 142KB [ 3034.938951] Acpi-ParseExt 31KB 31KB [ 3034.938962] Acpi-Parse 31KB 47KB [ 3034.938973] Acpi-State 43KB 59KB [ 3034.938983] Acpi-Namespace 28KB 28KB [ 3034.938997] numa_policy 3KB 3KB [ 3034.939008] perf_event 94KB 189KB [ 3034.939019] trace_event_file 175KB 175KB [ 3034.939031] ftrace_event_field 304KB 304KB [ 3034.939042] pool_workqueue 40KB 40KB [ 3034.939054] task_group 16KB 16KB [ 3034.939064] vmap_area 42KB 43KB [ 3034.939076] page->ptl 134KB 157KB [ 3034.939086] kmemleak_scan_area 23KB 23KB [ 3034.939636] kmemleak_object 129775KB 147614KB [ 3034.939665] kmalloc-cg-8k 96KB 96KB [ 3034.939676] kmalloc-cg-4k 1120KB 1120KB [ 3034.939687] kmalloc-cg-2k 612KB 704KB [ 3034.939698] kmalloc-cg-1k 280KB 320KB [ 3034.939708] kmalloc-cg-512 245KB 256KB [ 3034.939718] kmalloc-cg-256 16KB 16KB [ 3034.939728] kmalloc-cg-192 28KB 28KB [ 3034.939738] kmalloc-cg-128 20KB 20KB [ 3034.939748] kmalloc-cg-96 24KB 24KB [ 3034.939758] kmalloc-cg-64 20KB 20KB [ 3034.939769] kmalloc-cg-32 45KB 72KB [ 3034.939779] kmalloc-cg-16 8KB 8KB [ 3034.939789] kmalloc-cg-8 15KB 15KB [ 3034.939799] kmalloc-8k 5632KB 5632KB [ 3034.939810] kmalloc-4k 6584KB 6584KB [ 3034.939823] kmalloc-2k 4324KB 4608KB [ 3034.939835] kmalloc-1k 4532KB 4832KB [ 3034.939855] kmalloc-512 3342KB 4064KB [ 3034.939866] kmalloc-256 1147KB 1160KB [ 3034.939881] kmalloc-192 622KB 688KB [ 3034.939898] kmalloc-128 362KB 500KB [ 3034.939916] kmalloc-96 338KB 528KB [ 3034.939938] kmalloc-64 1113KB 1356KB [ 3034.939954] kmalloc-32 488KB 568KB [ 3034.939967] kmalloc-16 319KB 328KB [ 3034.939979] kmalloc-8 261KB 262KB [ 3034.939989] kmem_cache_node 51KB 51KB [ 3034.940001] kmem_cache 78KB 78KB [ 3034.940011] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-udevd.service,task=systemd-udevd,pid=12063,uid=0 [ 3034.940118] Out of memory: Killed process 12063 (systemd-udevd) total-vm:35756kB, anon-rss:10208kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0 [ 3034.997192] systemd invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=0 [ 3034.997222] CPU: 1 PID: 1 Comm: systemd Not tainted 5.18.0-rc5-next-20220502 #1 [ 3034.997239] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3034.997251] Call Trace: [ 3034.997256] [ 3034.997264] dump_stack_lvl+0x8b/0xb3 [ 3034.997290] dump_header+0x10b/0x7e4 [ 3034.997329] oom_kill_process.cold+0x10/0x15 [ 3034.997362] out_of_memory+0x358/0x14a0 [ 3034.997395] ? oom_killer_disable+0x270/0x270 [ 3034.997431] __alloc_pages_slowpath.constprop.0+0x1972/0x1f10 [ 3034.997479] ? warn_alloc+0x190/0x190 [ 3034.997514] ? prepare_alloc_pages+0x371/0x500 [ 3034.997552] __alloc_pages+0x403/0x4e0 [ 3034.997572] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 3034.997592] ? lock_is_held_type+0xd7/0x130 [ 3034.997628] ? __filemap_get_folio+0x2d4/0xfe0 [ 3034.997656] ? lock_downgrade+0x6d0/0x6d0 [ 3034.997680] ? lock_is_held_type+0xd7/0x130 [ 3034.997712] alloc_pages+0x1a0/0x2f0 [ 3034.997739] __filemap_get_folio+0x65f/0xfe0 [ 3034.997778] ? filemap_read+0xba0/0xba0 [ 3034.997827] filemap_fault+0x156a/0x2140 [ 3034.997866] ? __filemap_get_folio+0xfe0/0xfe0 [ 3034.997916] __do_fault+0x113/0x5a0 [ 3034.997944] __handle_mm_fault+0x13bc/0x3670 [ 3034.997973] ? lock_is_held_type+0xd7/0x130 [ 3034.997999] ? __pmd_alloc+0x680/0x680 [ 3034.998051] handle_mm_fault+0x2e6/0xa20 [ 3034.998076] do_user_addr_fault+0x54a/0x12a0 [ 3034.998114] exc_page_fault+0xa2/0x1a0 [ 3034.998138] ? asm_exc_page_fault+0x8/0x30 [ 3034.998163] asm_exc_page_fault+0x1e/0x30 [ 3034.998185] RIP: 0033:0x557259facd5d [ 3034.998206] Code: Unable to access opcode bytes at RIP 0x557259facd33. [ 3034.998214] RSP: 002b:00007ffd67cd3278 EFLAGS: 00010246 [ 3034.998228] RAX: 000055725a00b460 RBX: 000055725ab4db80 RCX: 000055725ac00df0 [ 3034.998239] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 000055725abbd0a0 [ 3034.998250] RBP: 00007ffd67cd3290 R08: 0000000000000001 R09: 000055725ab71a28 [ 3034.998261] R10: 00007ffd67cd3290 R11: 0000000000000010 R12: 00007ffd67cd3288 [ 3034.998272] R13: 00007ffd67cd3280 R14: 000055725abedf30 R15: 00007ffd67cd3560 [ 3034.998305] [ 3034.998379] Mem-Info: [ 3034.998384] active_anon:46 inactive_anon:7011 isolated_anon:0 [ 3034.998384] active_file:3 inactive_file:11 isolated_file:0 [ 3034.998384] unevictable:0 dirty:0 writeback:0 [ 3034.998384] slab_reclaimable:7440 slab_unreclaimable:58753 [ 3034.998384] mapped:17417 shmem:94 pagetables:297 bounce:0 [ 3034.998384] kernel_misc_reclaimable:0 [ 3034.998384] free:2242 free_pcp:412 free_cma:0 [ 3034.998427] Node 0 active_anon:184kB inactive_anon:28044kB active_file:12kB inactive_file:44kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:69668kB dirty:0kB writeback:0kB shmem:376kB writeback_tmp:0kB kernel_stack:3200kB pagetables:1188kB all_unreclaimable? yes [ 3034.998463] Node 0 DMA free:6480kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3034.998508] lowmem_reserve[]: 0 1615 1615 1615 [ 3034.998528] Node 0 DMA32 free:2488kB boost:12636kB min:17756kB low:19408kB high:21060kB reserved_highatomic:2048KB active_anon:184kB inactive_anon:28568kB active_file:0kB inactive_file:356kB unevictable:0kB writepending:0kB present:2080640kB managed:1658340kB mlocked:0kB bounce:0kB free_pcp:1648kB local_pcp:1344kB free_cma:0kB [ 3034.998574] lowmem_reserve[]: 0 0 0 0 [ 3034.998593] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6480kB [ 3034.998687] Node 0 DMA32: 80*4kB (UMEH) 57*8kB (UMEH) 9*16kB (UH) 6*32kB (H) 3*64kB (H) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 2584kB [ 3034.998795] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3034.998810] 126 total pagecache pages [ 3034.998815] 0 pages in swap cache [ 3034.998820] Swap cache stats: add 0, delete 0, find 0/0 [ 3034.998830] Free swap = 0kB [ 3034.998835] Total swap = 0kB [ 3034.998840] 524158 pages RAM [ 3034.998845] 0 pages HighMem/MovableOnly [ 3034.998850] 105733 pages reserved [ 3034.998857] Unreclaimable slab info: [ 3034.998861] Name Used Total [ 3034.998944] pid_3 3KB 3KB [ 3034.998956] pid_2 34KB 37KB [ 3034.998966] IEEE-802.15.4-MAC 31KB 31KB [ 3034.998975] IEEE-802.15.4-RAW 63KB 63KB [ 3034.998988] fib6_nodes 24KB 24KB [ 3034.998998] ip6_dst_cache 45KB 45KB [ 3034.999009] PINGv6 31KB 31KB [ 3034.999019] RAWv6 157KB 157KB [ 3034.999028] UDPLITEv6 31KB 31KB [ 3034.999037] UDPv6 62KB 62KB [ 3034.999049] TCPv6 62KB 62KB [ 3034.999063] scsi_sense_cache 8KB 8KB [ 3034.999074] virtio_scsi_cmd 16KB 16KB [ 3034.999085] bio-120 7KB 7KB [ 3034.999104] sgpool-128 89KB 89KB [ 3034.999114] sgpool-64 63KB 63KB [ 3034.999124] sgpool-32 204KB 204KB [ 3034.999135] sgpool-16 97KB 97KB [ 3034.999145] sgpool-8 60KB 60KB [ 3034.999156] mqueue_inode_cache 60KB 60KB [ 3034.999167] nfs_commit_data 15KB 15KB [ 3034.999178] nfs_write_data 47KB 47KB [ 3034.999191] jbd2_inode 11KB 11KB [ 3034.999202] ext4_system_zone 3KB 3KB [ 3034.999211] ext4_io_end_vec 7KB 7KB [ 3034.999221] ext4_bio_post_read_ctx 15KB 15KB [ 3034.999238] fasync_cache 7KB 7KB [ 3034.999249] pid_namespace 7KB 7KB [ 3034.999260] rpc_buffers 31KB 31KB [ 3034.999270] rpc_tasks 3KB 3KB [ 3034.999280] UNIX-STREAM 222KB 352KB [ 3034.999290] UNIX 198KB 288KB [ 3034.999302] UDP-Lite 63KB 63KB [ 3034.999351] tcp_bind_bucket 8KB 8KB [ 3034.999366] ip_fib_trie 8KB 8KB [ 3034.999377] ip_fib_alias 11KB 11KB [ 3034.999387] ip_dst_cache 8KB 8KB [ 3034.999399] RAW 31KB 31KB [ 3034.999410] UDP 175KB 252KB [ 3034.999421] request_sock_TCP 15KB 15KB [ 3034.999432] TCP 60KB 60KB [ 3034.999443] hugetlbfs_inode_cache 31KB 31KB [ 3034.999453] bio-248 11KB 11KB [ 3034.999463] ep_head 8KB 8KB [ 3034.999472] eventpoll_pwq 23KB 23KB [ 3034.999482] eventpoll_epi 47KB 47KB [ 3034.999491] inotify_inode_mark 46KB 46KB [ 3034.999502] request_queue 63KB 63KB [ 3034.999511] blkdev_ioc 8KB 8KB [ 3034.999521] bio-184 36KB 36KB [ 3034.999532] biovec-max 684KB 922KB [ 3034.999544] biovec-64 330KB 330KB [ 3034.999554] biovec-16 30KB 30KB [ 3034.999565] uid_cache 7KB 7KB [ 3034.999576] dmaengine-unmap-2 4KB 4KB [ 3034.999586] audit_buffer 7KB 7KB [ 3034.999598] skbuff_fclone_cache 60KB 60KB [ 3034.999616] skbuff_head_cache 673KB 802KB [ 3034.999628] file_lock_cache 39KB 39KB [ 3034.999638] file_lock_ctx 7KB 7KB [ 3034.999649] fsnotify_mark_connector 28KB 28KB [ 3034.999661] taskstats 30KB 30KB [ 3034.999671] proc_dir_entry 386KB 386KB [ 3034.999682] pde_opener 27KB 27KB [ 3034.999692] seq_file 56KB 56KB [ 3034.999703] sigqueue 11KB 31KB [ 3034.999714] shmem_inode_cache 1361KB 1454KB [ 3034.999725] kernfs_iattrs_cache 254KB 254KB [ 3034.999738] kernfs_node_cache 5215KB 5245KB [ 3034.999748] mnt_cache 157KB 157KB [ 3034.999761] filp 1476KB 1552KB [ 3034.999772] names_cache 10544KB 10680KB [ 3034.999782] net_namespace 80KB 80KB [ 3034.999793] hashtab_node 274KB 274KB [ 3034.999803] ebitmap_node 1149KB 1149KB [ 3034.999814] avtab_node 4976KB 4976KB [ 3034.999828] avc_node 31KB 31KB [ 3034.999853] lsm_inode_cache 2639KB 2996KB [ 3034.999864] lsm_file_cache 83KB 124KB [ 3034.999875] key_jar 31KB 31KB [ 3034.999886] uts_namespace 15KB 15KB [ 3034.999896] nsproxy 7KB 7KB [ 3034.999912] vm_area_struct 954KB 1064KB [ 3034.999923] mm_struct 246KB 283KB [ 3034.999934] fs_cache 40KB 40KB [ 3034.999945] files_cache 137KB 159KB [ 3034.999956] signal_cache 268KB 394KB [ 3034.999967] sighand_cache 328KB 360KB [ 3034.999978] task_struct 1147KB 1188KB [ 3034.999990] cred_jar 103KB 148KB [ 3035.000003] anon_vma_chain 190KB 212KB [ 3035.000014] anon_vma 160KB 180KB [ 3035.000025] pid 61KB 71KB [ 3035.000038] Acpi-Operand 83KB 142KB [ 3035.000049] Acpi-ParseExt 31KB 31KB [ 3035.000060] Acpi-Parse 31KB 47KB [ 3035.000070] Acpi-State 43KB 59KB [ 3035.000082] Acpi-Namespace 28KB 28KB [ 3035.000094] numa_policy 3KB 3KB [ 3035.000107] perf_event 94KB 189KB [ 3035.000117] trace_event_file 175KB 175KB [ 3035.000128] ftrace_event_field 304KB 304KB [ 3035.000139] pool_workqueue 40KB 40KB [ 3035.000149] task_group 16KB 16KB [ 3035.000160] vmap_area 42KB 43KB [ 3035.000172] page->ptl 134KB 157KB [ 3035.000182] kmemleak_scan_area 23KB 23KB [ 3035.000789] kmemleak_object 129775KB 147614KB [ 3035.000816] kmalloc-cg-8k 96KB 96KB [ 3035.000825] kmalloc-cg-4k 1120KB 1120KB [ 3035.000836] kmalloc-cg-2k 612KB 704KB [ 3035.000847] kmalloc-cg-1k 280KB 320KB [ 3035.000857] kmalloc-cg-512 245KB 256KB [ 3035.000868] kmalloc-cg-256 16KB 16KB [ 3035.000878] kmalloc-cg-192 28KB 28KB [ 3035.000889] kmalloc-cg-128 20KB 20KB [ 3035.000900] kmalloc-cg-96 24KB 24KB [ 3035.000910] kmalloc-cg-64 20KB 20KB [ 3035.000921] kmalloc-cg-32 45KB 72KB [ 3035.000932] kmalloc-cg-16 8KB 8KB [ 3035.000942] kmalloc-cg-8 15KB 15KB [ 3035.000952] kmalloc-8k 5632KB 5632KB [ 3035.000963] kmalloc-4k 6584KB 6584KB [ 3035.000976] kmalloc-2k 4324KB 4608KB [ 3035.000989] kmalloc-1k 4532KB 4832KB [ 3035.001010] kmalloc-512 3342KB 4064KB [ 3035.001021] kmalloc-256 1147KB 1160KB [ 3035.001036] kmalloc-192 622KB 688KB [ 3035.001052] kmalloc-128 362KB 500KB [ 3035.001072] kmalloc-96 338KB 528KB [ 3035.001094] kmalloc-64 1113KB 1356KB [ 3035.001109] kmalloc-32 488KB 568KB [ 3035.001121] kmalloc-16 319KB 328KB [ 3035.001132] kmalloc-8 261KB 262KB [ 3035.001142] kmem_cache_node 51KB 51KB [ 3035.001153] kmem_cache 78KB 78KB [ 3035.001163] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-udevd.service,task=systemd-udevd,pid=12052,uid=0 [ 3035.001856] Out of memory: Killed process 12052 (systemd-udevd) total-vm:35756kB, anon-rss:10208kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0 [ 3035.003521] Out of memory (oom_kill_allocating_task): Killed process 12028 (syz-executor.4) total-vm:93940kB, anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:136kB oom_score_adj:1000 [ 3035.621173] systemd[1]: Starting Journal Service... [ 3035.724560] systemd[1]: Starting Load/Save RF Kill Switch Status... [ 3035.727181] systemd[1]: systemd-udevd.service: A process of this unit has been killed by the OOM killer. [ 3035.744384] systemd[1]: ssh.service: Failed with result 'oom-kill'. [ 3035.745997] systemd[1]: ssh.service: Unit process 259 (sshd) remains running after unit stopped. [ 3035.797115] systemd[1]: ssh.service: Consumed 42min 34.779s CPU time. [ 3035.816191] systemd[1]: system.slice: A process of this unit has been killed by the OOM killer. [ 3035.865698] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 2. [ 3035.867246] systemd[1]: Stopped target Bluetooth. [ 3035.867288] systemd[1]: Stopped System Logging Service. [ 3035.933860] systemd[1]: Starting System Logging Service... [ 3035.953937] systemd[1]: systemd-udevd.service: Failed with result 'oom-kill'. [ 3035.990883] systemd[1]: systemd-udevd.service: Consumed 2min 26.256s CPU time. [ 3036.001018] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 1. [ 3036.001197] systemd[1]: systemd-udevd.service: Scheduled restart job, restart counter is at 1. [ 3036.001246] systemd[1]: Stopped OpenBSD Secure Shell server. [ 3036.005697] systemd[1]: ssh.service: Consumed 42min 34.779s CPU time. [ 3036.119619] systemd[1]: Starting OpenBSD Secure Shell server... [ 3036.119896] systemd[1]: Stopped Rule-based Manager for Device Events and Files. [ 3036.122631] systemd[1]: systemd-udevd.service: Consumed 2min 26.256s CPU time. [ 3036.167501] systemd[1]: Starting Rule-based Manager for Device Events and Files... [ 3036.170199] systemd[1]: Started Load/Save RF Kill Switch Status. [ 3036.251670] systemd[1]: Started System Logging Service. [ 3036.279607] systemd-journald[12080]: File /var/log/journal/7e681e5076844de4a5cfa8606a84b008/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 3036.609662] systemd[1]: Started OpenBSD Secure Shell server. [ 3036.679101] systemd[1]: Started Rule-based Manager for Device Events and Files. [ 3036.852524] systemd[1]: Started Journal Service. [ 3037.084678] systemd-journald[12080]: Received client request to flush runtime journal. VM DIAGNOSIS: 21:36:59 Registers: info registers vcpu 0 RAX=ffffffff86a5eda0 RBX=0000000000000000 RCX=0000000000000004 RDX=dffffc0000000000 RSI=0000000000000002 RDI=ffffffff85203b88 RBP=0000000000000000 RSP=ffff888065997460 R8 =0000000000000001 R9 =0000000000000000 R10=fffffbfff0b1e1da R11=0000000000000001 R12=ffff888042b58000 R13=0000000000000000 R14=ffffffff85203b80 R15=0000000000000002 RIP=ffffffff812888de RFL=00000016 [----AP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fcf0d6fc9e0 CR3=0000000005026000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f45ead0e440 00007f45ead0df20 YMM02=0000000000000000 0000000000000000 00007f45ea657060 00007f45ea938b30 YMM03=0000000000000000 0000000000000000 00007f45ead0e440 00007f45ead0df20 YMM04=0000000000000000 0000000000000000 00007f45eab54000 000055a72add6510 YMM05=0000000000000000 0000000000000000 00007f45ea658820 00007f45eab54f60 YMM06=0000000000000000 0000000000000000 00007f45ead0e950 00007f45ead0e440 YMM07=0000000000000000 0000000000000000 00007f45ead0df20 00007f45ea658120 YMM08=0000000000000000 0000000000000000 00007f45ea657b10 00007f45ea6575f0 YMM09=0000000000000000 0000000000000000 ffffffffffff00ff ffff00ffffff00ff YMM10=0000000000000000 0000000000000000 0000200000000020 2020002020200000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000080000001 RBX=ffffea0000e8e800 RCX=0000000080000001 RDX=0000000000000000 RSI=ffffffff817344d7 RDI=0000000000000003 RBP=0000000000000000 RSP=ffff888017ab76d8 R8 =0000000000000000 R9 =0000000000000000 R10=ffffffff817344cd R11=0000000000000000 R12=ffffea0000e8e808 R13=ffff88800916fa00 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff814449dd RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fded484b360 CR3=000000000ef94000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffff000000000000 ffffff0000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 000000000000ff00 YMM03=0000000000000000 0000000000000000 006c6f72746e6f63 5f65657274627573 YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0101010000ffff02 00000006ffffffff YMM06=0000000000000000 0000000000000000 0000000000000065 63697665642e3669 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 7469646e6f632e64 6d65747379730065 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000200020000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000