pare+0x27b/0x3f0 [ 1647.345498] ? __pfx_p9_client_create+0x10/0x10 [ 1647.345822] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1647.346173] ? lockdep_init_map_type+0x21e/0x7e0 [ 1647.346496] ? __kasan_kmalloc+0x7f/0x90 [ 1647.346784] ? __raw_spin_lock_init+0x3a/0x110 [ 1647.347108] v9fs_session_init+0x1e0/0x17b0 [ 1647.347411] ? __pfx_lock_release+0x10/0x10 [ 1647.347705] ? __pfx_v9fs_session_init+0x10/0x10 [ 1647.348040] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1647.348394] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1647.348731] ? v9fs_mount+0x9e/0xbd0 [ 1647.349023] v9fs_mount+0xbd/0xbd0 [ 1647.349282] ? legacy_init_fs_context+0x44/0xe0 [ 1647.349600] ? __pfx_v9fs_mount+0x10/0x10 [ 1647.349901] ? cap_capable+0x1be/0x220 [ 1647.350193] ? __pfx_v9fs_mount+0x10/0x10 [ 1647.350499] legacy_get_tree+0x109/0x220 [ 1647.350794] vfs_get_tree+0x92/0x360 [ 1647.351083] path_mount+0x133c/0x1e50 [ 1647.351382] ? kasan_quarantine_put+0x81/0x1d0 [ 1647.351737] ? __pfx_path_mount+0x10/0x10 [ 1647.352053] ? putname+0x102/0x140 [ 1647.352325] ? kmem_cache_free+0xff/0x4a0 [ 1647.352609] ? putname+0x102/0x140 [ 1647.352884] __x64_sys_mount+0x286/0x310 [ 1647.353168] ? __pfx___x64_sys_mount+0x10/0x10 [ 1647.353507] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1647.353898] do_syscall_64+0x3f/0x90 [ 1647.354186] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1647.354579] RIP: 0033:0x7f378de9bb19 [ 1647.354859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1647.356135] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1647.356678] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1647.357194] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1647.357712] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1647.358223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1647.358744] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1647.359259] [ 1647.364608] loop6: detected capacity change from 0 to 256 [ 1647.412987] 9p: Unknown access argument À: -22 [ 1647.435884] loop7: detected capacity change from 0 to 256 [ 1647.460905] FAULT_INJECTION: forcing a failure. [ 1647.460905] name failslab, interval 1, probability 0, space 0, times 0 [ 1647.463520] CPU: 0 PID: 9512 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1647.464577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1647.465645] Call Trace: [ 1647.465999] [ 1647.466314] dump_stack_lvl+0xc1/0xf0 [ 1647.466852] should_fail_ex+0x4b4/0x5b0 [ 1647.467422] should_failslab+0x9/0x20 [ 1647.467953] __kmem_cache_alloc_node+0x5b/0x310 [ 1647.468590] ? __vmalloc_node_range+0x568/0x1470 [ 1647.469254] ? __vmalloc_node_range+0x568/0x1470 [ 1647.469894] __kmalloc_node+0x4d/0x160 [ 1647.470438] __vmalloc_node_range+0x568/0x1470 [ 1647.471072] ? bdev_disk_changed+0x339/0x1350 [ 1647.471685] ? __kmem_cache_alloc_node+0x1f8/0x310 [ 1647.472386] ? __pfx___vmalloc_node_range+0x10/0x10 [ 1647.473103] ? bdev_disk_changed+0x339/0x1350 [ 1647.473727] __vmalloc_node+0xac/0xf0 [ 1647.474262] ? bdev_disk_changed+0x339/0x1350 [ 1647.474890] bdev_disk_changed+0x339/0x1350 [ 1647.475483] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1647.476224] loop_reread_partitions+0x70/0x140 [ 1647.476872] loop_set_status+0x4b8/0x860 [ 1647.477470] lo_ioctl+0x709/0x1990 [ 1647.477981] ? __pfx_lo_ioctl+0x10/0x10 [ 1647.478529] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1647.479277] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1647.480044] ? perf_trace_lock+0xc1/0x480 [ 1647.480630] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1647.481371] ? do_vfs_ioctl+0x132/0x1690 [ 1647.481952] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1647.482669] ? blkdev_common_ioctl+0x19e/0x1950 [ 1647.483319] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1647.484130] ? __pfx_blkdev_common_ioctl+0x10/0x10 [ 1647.484814] ? __destroy_inode+0x62c/0x750 [ 1647.485408] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1647.486260] ? __pfx_lock_release+0x10/0x10 [ 1647.486870] ? perf_trace_preemptirq_template+0x252/0x420 [ 1647.487638] ? __pfx_lo_ioctl+0x10/0x10 [ 1647.488195] blkdev_ioctl+0x35e/0x7e0 [ 1647.488739] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1647.489367] ? selinux_file_ioctl+0xba/0x270 [ 1647.490004] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1647.490605] __x64_sys_ioctl+0x19e/0x210 [ 1647.491192] do_syscall_64+0x3f/0x90 [ 1647.491723] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1647.492439] RIP: 0033:0x7f2fa42228d7 [ 1647.492952] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1647.495275] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 1647.496283] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa42228d7 [ 1647.497255] RDX: 00007f2fa1798050 RSI: 0000000000004c04 RDI: 0000000000000008 [ 1647.498197] RBP: 00007f2fa17981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1647.499147] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f2fa1798050 [ 1647.500088] R13: 00007ffe188d841f R14: 00007f2fa1798300 R15: 0000000000022000 [ 1647.501072] [ 1647.501845] syz-executor.7: vmalloc error: size 32768, failed to allocated page array size 64, mode:0xdc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_ZERO), nodemask=(null),cpuset=syz7,mems_allowed=0 [ 1647.505483] CPU: 0 PID: 9512 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1647.506584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1647.507672] Call Trace: [ 1647.508033] [ 1647.508356] dump_stack_lvl+0xc1/0xf0 [ 1647.508899] warn_alloc+0x214/0x370 [ 1647.509463] ? __pfx_warn_alloc+0x10/0x10 [ 1647.510055] ? dump_stack_lvl+0xdc/0xf0 [ 1647.510626] ? should_fail_ex+0x2ed/0x5b0 [ 1647.511224] ? should_failslab+0x9/0x20 [ 1647.511781] ? __kmem_cache_alloc_node+0x5b/0x310 [ 1647.512458] ? __kasan_kmalloc+0x6f/0x90 [ 1647.513051] __vmalloc_node_range+0x1065/0x1470 [ 1647.513709] ? bdev_disk_changed+0x339/0x1350 [ 1647.514355] ? __pfx___vmalloc_node_range+0x10/0x10 [ 1647.515066] ? bdev_disk_changed+0x339/0x1350 [ 1647.515685] __vmalloc_node+0xac/0xf0 [ 1647.516224] ? bdev_disk_changed+0x339/0x1350 [ 1647.516852] bdev_disk_changed+0x339/0x1350 [ 1647.517464] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1647.518211] loop_reread_partitions+0x70/0x140 [ 1647.518863] loop_set_status+0x4b8/0x860 [ 1647.519451] lo_ioctl+0x709/0x1990 [ 1647.519964] ? __pfx_lo_ioctl+0x10/0x10 [ 1647.520507] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1647.521286] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1647.522064] ? perf_trace_lock+0xc1/0x480 [ 1647.522653] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1647.523382] ? do_vfs_ioctl+0x132/0x1690 [ 1647.523972] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1647.524688] ? blkdev_common_ioctl+0x19e/0x1950 [ 1647.525347] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1647.526153] ? __pfx_blkdev_common_ioctl+0x10/0x10 [ 1647.527034] ? __destroy_inode+0x62c/0x750 [ 1647.527773] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1647.528835] ? __pfx_lock_release+0x10/0x10 [ 1647.529517] ? perf_trace_preemptirq_template+0x252/0x420 [ 1647.530276] ? __pfx_lo_ioctl+0x10/0x10 [ 1647.530836] blkdev_ioctl+0x35e/0x7e0 [ 1647.531377] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1647.531983] ? selinux_file_ioctl+0xba/0x270 [ 1647.532617] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1647.533256] __x64_sys_ioctl+0x19e/0x210 [ 1647.533846] do_syscall_64+0x3f/0x90 [ 1647.534390] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1647.535116] RIP: 0033:0x7f2fa42228d7 [ 1647.535630] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1647.538021] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 1647.539031] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa42228d7 [ 1647.539985] RDX: 00007f2fa1798050 RSI: 0000000000004c04 RDI: 0000000000000008 [ 1647.540933] RBP: 00007f2fa17981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1647.541889] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f2fa1798050 [ 1647.542843] R13: 00007ffe188d841f R14: 00007f2fa1798300 R15: 0000000000022000 [ 1647.543818] [ 1647.549471] Mem-Info: [ 1647.549852] active_anon:63 inactive_anon:50156 isolated_anon:0 [ 1647.549852] active_file:8942 inactive_file:59288 isolated_file:0 [ 1647.549852] unevictable:2 dirty:414 writeback:0 [ 1647.549852] slab_reclaimable:9500 slab_unreclaimable:54441 [ 1647.549852] mapped:82051 shmem:115 pagetables:1781 [ 1647.549852] sec_pagetables:0 bounce:0 [ 1647.549852] kernel_misc_reclaimable:0 [ 1647.549852] free:154651 free_pcp:983 free_cma:0 [ 1647.557622] Node 0 active_anon:252kB inactive_anon:200624kB active_file:35768kB inactive_file:237152kB unevictable:8kB isolated(anon):0kB isolated(file):0kB mapped:328204kB dirty:1656kB writeback:0kB shmem:460kB writeback_tmp:0kB kernel_stack:4832kB pagetables:7124kB sec_pagetables:0kB all_unreclaimable? no [ 1647.561674] Node 0 DMA free:15360kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1647.565711] lowmem_reserve[]: 0 1606 1606 1606 [ 1647.567294] Node 0 DMA32 free:603244kB boost:0kB min:5104kB low:6748kB high:8392kB reserved_highatomic:0KB active_anon:252kB inactive_anon:200624kB active_file:35768kB inactive_file:237152kB unevictable:8kB writepending:1740kB present:2080640kB managed:1655400kB mlocked:0kB bounce:0kB free_pcp:4304kB local_pcp:1784kB free_cma:0kB [ 1647.571640] lowmem_reserve[]: 0 0 0 0 [ 1647.572812] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1647.575597] Node 0 DMA32: 1*4kB (M) 119*8kB (UME) 156*16kB (UM) 76*32kB (UME) 38*64kB (UME) 10*128kB (UME) 2*256kB (UE) 2*512kB (UM) 4*1024kB (UME) 1*2048kB (M) 143*4096kB (UM) = 603004kB [ 1647.579584] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1647.581533] 23385 total pagecache pages [ 1647.582776] 0 pages in swap cache [ 1647.583842] Free swap = 0kB [ 1647.584785] Total swap = 0kB [ 1647.585743] 524158 pages RAM [ 1647.586761] 0 pages HighMem/MovableOnly [ 1647.587827] 106468 pages reserved [ 1647.697814] 9p: Unknown access argument À: -22 09:10:00 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x9, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:10:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xedc000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1662.681737] loop6: detected capacity change from 0 to 256 [ 1662.691617] loop5: detected capacity change from 0 to 256 09:10:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0x8, 0x200202) openat(r0, &(0x7f0000000140)='./file0\x00', 0x40, 0x40) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0"]) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r3) 09:10:00 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 49) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:10:00 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:10:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 83) 09:10:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x8004}, {0x0, 0x0, 0x10000}]) 09:10:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x70c, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:10:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x1000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1662.732288] loop6: detected capacity change from 0 to 256 [ 1662.744372] loop7: detected capacity change from 0 to 256 [ 1662.757874] FAULT_INJECTION: forcing a failure. [ 1662.757874] name failslab, interval 1, probability 0, space 0, times 0 [ 1662.758394] FAULT_INJECTION: forcing a failure. [ 1662.758394] name failslab, interval 1, probability 0, space 0, times 0 [ 1662.759012] CPU: 1 PID: 9542 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1662.759040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1662.761249] Call Trace: [ 1662.761503] [ 1662.761727] dump_stack_lvl+0xc1/0xf0 [ 1662.762133] should_fail_ex+0x4b4/0x5b0 [ 1662.762538] ? __kernfs_new_node+0xd4/0x870 [ 1662.762965] should_failslab+0x9/0x20 [ 1662.763417] kmem_cache_alloc+0x5a/0x390 [ 1662.763835] __kernfs_new_node+0xd4/0x870 [ 1662.764247] ? __pfx___kernfs_new_node+0x10/0x10 [ 1662.764707] ? down_write+0x11a/0x1f0 [ 1662.765088] ? up_write+0x196/0x510 [ 1662.765478] kernfs_new_node+0x97/0x120 [ 1662.765868] __kernfs_create_file+0x55/0x350 [ 1662.766315] sysfs_add_file_mode_ns+0x21c/0x440 [ 1662.766759] ? __pfx_slab_attr_store+0x10/0x10 [ 1662.767222] internal_create_group+0x322/0xb90 [ 1662.767665] ? __pfx_internal_create_group+0x10/0x10 [ 1662.768151] ? up_write+0x196/0x510 [ 1662.768522] sysfs_slab_add+0x18e/0x220 [ 1662.768909] __kmem_cache_create+0x1fe/0x610 [ 1662.769355] kmem_cache_create_usercopy+0x218/0x340 [ 1662.769839] p9_client_create+0xd0b/0x1260 [ 1662.770255] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1662.770746] ? __pfx_p9_client_create+0x10/0x10 [ 1662.771195] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1662.771667] ? lockdep_init_map_type+0x21e/0x7e0 [ 1662.772127] ? __kasan_kmalloc+0x7f/0x90 [ 1662.772531] ? __raw_spin_lock_init+0x3a/0x110 [ 1662.772978] v9fs_session_init+0x1e0/0x17b0 [ 1662.773418] ? __pfx_lock_release+0x10/0x10 [ 1662.773829] ? __pfx_v9fs_session_init+0x10/0x10 [ 1662.774302] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1662.774804] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1662.775282] ? v9fs_mount+0x9e/0xbd0 [ 1662.775665] v9fs_mount+0xbd/0xbd0 [ 1662.776020] ? legacy_init_fs_context+0x44/0xe0 [ 1662.776467] ? __pfx_v9fs_mount+0x10/0x10 [ 1662.776872] ? cap_capable+0x1be/0x220 [ 1662.777298] ? __pfx_v9fs_mount+0x10/0x10 [ 1662.777705] legacy_get_tree+0x109/0x220 [ 1662.778114] vfs_get_tree+0x92/0x360 [ 1662.778492] path_mount+0x133c/0x1e50 [ 1662.778882] ? kasan_quarantine_put+0x81/0x1d0 [ 1662.779333] ? __pfx_path_mount+0x10/0x10 [ 1662.779734] ? putname+0x102/0x140 [ 1662.780088] ? kmem_cache_free+0xff/0x4a0 [ 1662.780498] ? putname+0x102/0x140 [ 1662.780854] __x64_sys_mount+0x286/0x310 [ 1662.781278] ? __pfx___x64_sys_mount+0x10/0x10 [ 1662.781712] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1662.782220] do_syscall_64+0x3f/0x90 [ 1662.782590] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1662.783083] RIP: 0033:0x7f378de9bb19 [ 1662.783446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1662.785071] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1662.785811] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1662.786468] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1662.787116] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1662.787762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1662.788417] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1662.789093] [ 1662.789332] CPU: 0 PID: 9541 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1662.789850] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1662.790357] Call Trace: [ 1662.790527] [ 1662.790681] dump_stack_lvl+0xc1/0xf0 [ 1662.790950] should_fail_ex+0x4b4/0x5b0 [ 1662.791225] should_failslab+0x9/0x20 [ 1662.791482] __kmem_cache_alloc_node+0x5b/0x310 [ 1662.791794] ? efi_partition+0x294/0x2930 [ 1662.792074] kmalloc_trace+0x26/0xc0 [ 1662.792328] efi_partition+0x294/0x2930 [ 1662.792589] ? __pfx_format_decode+0x10/0x10 [ 1662.792886] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1662.793238] ? __pfx_efi_partition+0x10/0x10 [ 1662.793577] ? __alloc_pages+0x3a3/0x480 [ 1662.793858] ? __pfx___alloc_pages+0x10/0x10 [ 1662.794200] ? snprintf+0xbf/0x100 [ 1662.794448] ? __pfx_snprintf+0x10/0x10 [ 1662.794758] ? alloc_pages+0x1a8/0x260 [ 1662.795026] ? __pfx_efi_partition+0x10/0x10 [ 1662.795359] bdev_disk_changed+0x66c/0x1350 [ 1662.795649] ? mark_lock.part.0+0xef/0x2f50 [ 1662.795975] loop_reread_partitions+0x70/0x140 [ 1662.796288] loop_set_status+0x4b8/0x860 [ 1662.796608] lo_ioctl+0x709/0x1990 [ 1662.796852] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1662.797276] ? __pfx_lo_ioctl+0x10/0x10 [ 1662.797536] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1662.797940] ? perf_trace_lock+0xc1/0x480 [ 1662.798220] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1662.798605] ? do_vfs_ioctl+0x132/0x1690 [ 1662.798887] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1662.799272] ? blkdev_common_ioctl+0x19e/0x1950 [ 1662.799586] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1662.800016] ? __pfx_blkdev_common_ioctl+0x10/0x10 [ 1662.800344] ? __destroy_inode+0x62c/0x750 [ 1662.800622] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1662.801071] ? __pfx_lock_release+0x10/0x10 [ 1662.801374] ? perf_trace_preemptirq_template+0x252/0x420 [ 1662.801786] ? __pfx_lo_ioctl+0x10/0x10 [ 1662.802053] blkdev_ioctl+0x35e/0x7e0 [ 1662.802342] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1662.802633] ? selinux_file_ioctl+0xba/0x270 [ 1662.802971] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1662.803262] __x64_sys_ioctl+0x19e/0x210 [ 1662.803578] do_syscall_64+0x3f/0x90 [ 1662.803833] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1662.804217] RIP: 0033:0x7f2fa42228d7 [ 1662.804465] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1662.805747] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 1662.806234] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa42228d7 [ 1662.806682] RDX: 00007f2fa1798050 RSI: 0000000000004c04 RDI: 0000000000000008 [ 1662.807131] RBP: 00007f2fa17981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1662.807573] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f2fa1798050 [ 1662.808023] R13: 00007ffe188d841f R14: 00007f2fa1798300 R15: 0000000000022000 [ 1662.808484] [ 1662.853440] kmem_cache_create_usercopy(9p-fcall-cache) failed with error -12 [ 1662.854264] CPU: 1 PID: 9542 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1662.855007] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1662.855755] Call Trace: [ 1662.856004] [ 1662.856228] dump_stack_lvl+0xc1/0xf0 [ 1662.856613] kmem_cache_create_usercopy+0x12b/0x340 [ 1662.857102] p9_client_create+0xd0b/0x1260 [ 1662.857541] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1662.858036] ? __pfx_p9_client_create+0x10/0x10 [ 1662.858495] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1662.858971] ? lockdep_init_map_type+0x21e/0x7e0 [ 1662.859436] ? __kasan_kmalloc+0x7f/0x90 [ 1662.859838] ? __raw_spin_lock_init+0x3a/0x110 [ 1662.860298] v9fs_session_init+0x1e0/0x17b0 [ 1662.860726] ? __pfx_lock_release+0x10/0x10 [ 1662.861155] ? __pfx_v9fs_session_init+0x10/0x10 [ 1662.861646] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1662.862154] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1662.862623] ? v9fs_mount+0x9e/0xbd0 [ 1662.863021] v9fs_mount+0xbd/0xbd0 [ 1662.863378] ? legacy_init_fs_context+0x44/0xe0 [ 1662.863832] ? __pfx_v9fs_mount+0x10/0x10 [ 1662.864249] ? cap_capable+0x1be/0x220 [ 1662.864653] ? __pfx_v9fs_mount+0x10/0x10 [ 1662.865061] legacy_get_tree+0x109/0x220 [ 1662.865477] vfs_get_tree+0x92/0x360 [ 1662.865853] path_mount+0x133c/0x1e50 [ 1662.866246] ? kasan_quarantine_put+0x81/0x1d0 [ 1662.866692] ? __pfx_path_mount+0x10/0x10 [ 1662.867112] ? putname+0x102/0x140 [ 1662.867465] ? kmem_cache_free+0xff/0x4a0 [ 1662.867882] ? putname+0x102/0x140 [ 1662.868242] __x64_sys_mount+0x286/0x310 [ 1662.868633] ? __pfx___x64_sys_mount+0x10/0x10 [ 1662.869068] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1662.869582] do_syscall_64+0x3f/0x90 [ 1662.869955] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1662.870470] RIP: 0033:0x7f378de9bb19 [ 1662.870824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1662.872492] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1662.873215] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1662.873884] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1662.874554] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1662.875212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1662.875890] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1662.876568] [ 1662.879101] 9p: Unknown access argument À: -22 [ 1662.891312] 9p: Unknown access argument À: -22 [ 1662.905172] 9p: Unknown access argument À: -22 09:10:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 84) 09:10:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='=\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:10:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x900, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:10:13 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xa, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:10:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xeffd}, {0x0, 0x0, 0x10000}]) 09:10:13 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:10:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:10:13 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 50) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:10:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) r3 = clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00020000000400002c7266646e6f3defeeec94c2", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x3ff, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x9, 0x1, 0xf5, 0x9, 0x0, 0x9, 0x80000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000080), 0xe}, 0x18141, 0x6, 0x3, 0x2, 0x2, 0xfffffff8, 0x1, 0x0, 0x80000000, 0x0, 0x45}, r3, 0x4, r4, 0x8) [ 1676.035856] loop6: detected capacity change from 0 to 256 [ 1676.047884] loop6: detected capacity change from 0 to 256 09:10:13 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1676.057040] loop5: detected capacity change from 0 to 256 [ 1676.066402] 9p: Unknown access argument À: -22 09:10:13 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xd, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:10:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xf000}, {0x0, 0x0, 0x10000}]) [ 1676.135792] loop7: detected capacity change from 0 to 256 09:10:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa00, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:10:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x100000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:10:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 85) 09:10:13 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1676.196597] loop5: detected capacity change from 0 to 256 [ 1676.196791] loop6: detected capacity change from 0 to 256 09:10:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfdef}, {0x0, 0x0, 0x10000}]) 09:10:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xc07, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:10:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c0000636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1676.262796] FAULT_INJECTION: forcing a failure. [ 1676.262796] name failslab, interval 1, probability 0, space 0, times 0 [ 1676.264425] CPU: 0 PID: 9599 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1676.265506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1676.266569] Call Trace: [ 1676.266924] [ 1676.267235] dump_stack_lvl+0xc1/0xf0 [ 1676.267780] should_fail_ex+0x4b4/0x5b0 [ 1676.268354] ? __kernfs_new_node+0xd4/0x870 [ 1676.268931] should_failslab+0x9/0x20 [ 1676.269479] kmem_cache_alloc+0x5a/0x390 [ 1676.270047] __kernfs_new_node+0xd4/0x870 [ 1676.270616] ? __pfx___kernfs_new_node+0x10/0x10 [ 1676.271269] ? down_write+0x11a/0x1f0 [ 1676.271810] ? up_write+0x196/0x510 [ 1676.272339] kernfs_new_node+0x97/0x120 [ 1676.272896] __kernfs_create_file+0x55/0x350 [ 1676.273522] sysfs_add_file_mode_ns+0x21c/0x440 [ 1676.274151] ? __pfx_slab_attr_store+0x10/0x10 [ 1676.274788] internal_create_group+0x322/0xb90 [ 1676.275414] ? __pfx_internal_create_group+0x10/0x10 [ 1676.276111] ? up_write+0x196/0x510 [ 1676.276632] sysfs_slab_add+0x18e/0x220 [ 1676.277174] __kmem_cache_create+0x1fe/0x610 [ 1676.277801] kmem_cache_create_usercopy+0x218/0x340 [ 1676.278486] p9_client_create+0xd0b/0x1260 [ 1676.279076] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1676.279783] ? __pfx_p9_client_create+0x10/0x10 [ 1676.280354] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1676.281030] ? lockdep_init_map_type+0x21e/0x7e0 [ 1676.281670] ? __kasan_kmalloc+0x7f/0x90 [ 1676.282236] ? __raw_spin_lock_init+0x3a/0x110 [ 1676.282862] v9fs_session_init+0x1e0/0x17b0 [ 1676.283464] ? __pfx_lock_release+0x10/0x10 [ 1676.284053] ? __pfx_v9fs_session_init+0x10/0x10 [ 1676.284703] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1676.285412] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1676.286078] ? v9fs_mount+0x9e/0xbd0 [ 1676.286618] v9fs_mount+0xbd/0xbd0 [ 1676.287131] ? __pfx_v9fs_mount+0x10/0x10 [ 1676.287714] ? cap_capable+0x1be/0x220 [ 1676.288270] ? __pfx_v9fs_mount+0x10/0x10 [ 1676.288843] legacy_get_tree+0x109/0x220 [ 1676.289440] vfs_get_tree+0x92/0x360 [ 1676.289961] path_mount+0x133c/0x1e50 [ 1676.290503] ? kasan_quarantine_put+0x81/0x1d0 [ 1676.291124] ? __pfx_path_mount+0x10/0x10 [ 1676.291697] ? putname+0x102/0x140 [ 1676.292196] ? kmem_cache_free+0xff/0x4a0 09:10:14 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1123, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1676.292772] ? putname+0x102/0x140 [ 1676.293375] __x64_sys_mount+0x286/0x310 [ 1676.293884] ? __pfx___x64_sys_mount+0x10/0x10 [ 1676.294438] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1676.295074] do_syscall_64+0x3f/0x90 [ 1676.295547] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1676.296177] RIP: 0033:0x7f378de9bb19 [ 1676.296627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1676.298735] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1676.299712] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1676.300485] loop5: detected capacity change from 0 to 256 [ 1676.300628] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1676.301963] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1676.302868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1676.303771] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 09:10:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfeff}, {0x0, 0x0, 0x10000}]) [ 1676.304700] 09:10:14 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 51) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1676.337004] loop6: detected capacity change from 0 to 256 09:10:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xd00, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:10:14 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xf, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:10:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x200000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:10:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfffe}, {0x0, 0x0, 0x10000}]) 09:10:14 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1800, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1676.421686] loop5: detected capacity change from 0 to 256 [ 1676.441587] loop7: detected capacity change from 0 to 256 [ 1676.446270] loop6: detected capacity change from 0 to 256 [ 1676.452780] FAULT_INJECTION: forcing a failure. [ 1676.452780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1676.455570] CPU: 0 PID: 9619 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1676.456648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1676.457735] Call Trace: [ 1676.458084] [ 1676.458396] dump_stack_lvl+0xc1/0xf0 [ 1676.458934] should_fail_ex+0x4b4/0x5b0 [ 1676.459498] __should_fail_alloc_page+0xe0/0x110 [ 1676.460157] prepare_alloc_pages+0x178/0x500 [ 1676.460779] ? lock_acquire+0x19a/0x4c0 [ 1676.461328] __alloc_pages+0x149/0x480 [ 1676.461887] ? lock_release+0x1e3/0x680 [ 1676.462432] ? __pfx___alloc_pages+0x10/0x10 [ 1676.463050] ? __pfx_lock_release+0x10/0x10 [ 1676.463651] ? xas_start+0x14e/0x710 [ 1676.464186] ? xas_load+0x6a/0x140 [ 1676.464656] alloc_pages+0x1a0/0x260 [ 1676.465164] filemap_alloc_folio+0x374/0x410 [ 1676.465715] ? do_syscall_64+0x3f/0x90 [ 1676.466247] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1676.466972] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 1676.467634] ? __filemap_get_folio+0x1d3/0x8d0 [ 1676.468262] do_read_cache_folio+0x18c/0x500 [ 1676.468877] ? __pfx_blkdev_read_folio+0x10/0x10 09:10:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf00, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1676.469526] read_part_sector+0xfa/0x330 [ 1676.470154] read_lba+0x21d/0x470 [ 1676.470603] ? __pfx_read_lba+0x10/0x10 [ 1676.471093] ? efi_partition+0x294/0x2930 [ 1676.471610] efi_partition+0x2bc/0x2930 [ 1676.472102] ? __pfx_format_decode+0x10/0x10 [ 1676.472649] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1676.473285] ? __pfx_efi_partition+0x10/0x10 [ 1676.473899] ? __alloc_pages+0x3a3/0x480 [ 1676.474408] ? __pfx___alloc_pages+0x10/0x10 [ 1676.475023] ? snprintf+0xbf/0x100 [ 1676.475472] ? __pfx_snprintf+0x10/0x10 [ 1676.475979] ? alloc_pages+0x1a8/0x260 [ 1676.476512] ? __pfx_efi_partition+0x10/0x10 [ 1676.477119] bdev_disk_changed+0x66c/0x1350 [ 1676.477723] ? mark_lock.part.0+0xef/0x2f50 [ 1676.478312] loop_reread_partitions+0x70/0x140 [ 1676.478946] loop_set_status+0x4b8/0x860 [ 1676.479523] lo_ioctl+0x709/0x1990 [ 1676.480027] ? __pfx_lo_ioctl+0x10/0x10 [ 1676.480557] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1676.481282] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1676.482002] ? perf_trace_lock+0xc1/0x480 [ 1676.482562] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1676.483258] ? do_vfs_ioctl+0x132/0x1690 [ 1676.483817] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1676.484509] ? blkdev_common_ioctl+0x19e/0x1950 [ 1676.485138] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1676.485924] ? __pfx_blkdev_common_ioctl+0x10/0x10 [ 1676.486591] ? __destroy_inode+0x62c/0x750 [ 1676.487167] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1676.488006] ? __pfx_lock_release+0x10/0x10 [ 1676.488602] ? perf_trace_preemptirq_template+0x252/0x420 [ 1676.489340] ? __pfx_lo_ioctl+0x10/0x10 [ 1676.489904] blkdev_ioctl+0x35e/0x7e0 [ 1676.490427] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1676.491015] ? selinux_file_ioctl+0xba/0x270 [ 1676.491633] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1676.492225] __x64_sys_ioctl+0x19e/0x210 [ 1676.492793] do_syscall_64+0x3f/0x90 [ 1676.493265] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1676.493978] RIP: 0033:0x7f2fa42228d7 [ 1676.494476] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1676.496787] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 1676.497775] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa42228d7 [ 1676.498672] RDX: 00007f2fa1798050 RSI: 0000000000004c04 RDI: 0000000000000008 [ 1676.499569] RBP: 00007f2fa17981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1676.500446] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f2fa1798050 [ 1676.501316] R13: 00007ffe188d841f R14: 00007f2fa1798300 R15: 0000000000022000 [ 1676.502241] 09:10:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x10040}, {0x0, 0x0, 0x10000}]) [ 1676.510272] loop6: detected capacity change from 0 to 256 09:10:14 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1676.521036] loop5: detected capacity change from 0 to 256 [ 1676.521582] kmem_cache_create_usercopy(9p-fcall-cache) failed with error -12 [ 1676.524304] CPU: 0 PID: 9599 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1676.525332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1676.526352] Call Trace: [ 1676.526686] [ 1676.526987] dump_stack_lvl+0xc1/0xf0 [ 1676.527496] kmem_cache_create_usercopy+0x12b/0x340 [ 1676.528146] p9_client_create+0xd0b/0x1260 [ 1676.528698] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1676.529398] ? __pfx_p9_client_create+0x10/0x10 [ 1676.530008] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1676.530657] ? lockdep_init_map_type+0x21e/0x7e0 [ 1676.531282] ? __kasan_kmalloc+0x7f/0x90 [ 1676.531825] ? __raw_spin_lock_init+0x3a/0x110 [ 1676.532431] v9fs_session_init+0x1e0/0x17b0 [ 1676.533019] ? __pfx_lock_release+0x10/0x10 [ 1676.533592] ? __pfx_v9fs_session_init+0x10/0x10 [ 1676.534211] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1676.534891] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1676.535530] ? v9fs_mount+0x9e/0xbd0 [ 1676.536044] v9fs_mount+0xbd/0xbd0 [ 1676.536535] ? __pfx_v9fs_mount+0x10/0x10 [ 1676.537088] ? cap_capable+0x1be/0x220 [ 1676.537629] ? __pfx_v9fs_mount+0x10/0x10 [ 1676.538186] legacy_get_tree+0x109/0x220 [ 1676.538736] vfs_get_tree+0x92/0x360 [ 1676.539251] path_mount+0x133c/0x1e50 [ 1676.539768] ? kasan_quarantine_put+0x81/0x1d0 [ 1676.540373] ? __pfx_path_mount+0x10/0x10 [ 1676.540921] ? putname+0x102/0x140 [ 1676.541416] ? kmem_cache_free+0xff/0x4a0 [ 1676.541967] ? putname+0x102/0x140 [ 1676.542453] __x64_sys_mount+0x286/0x310 [ 1676.542991] ? __pfx___x64_sys_mount+0x10/0x10 [ 1676.543573] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1676.544246] do_syscall_64+0x3f/0x90 [ 1676.544745] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1676.545422] RIP: 0033:0x7f378de9bb19 [ 1676.545915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1676.548177] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1676.549116] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1676.550008] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1676.550889] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1676.551782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1676.552674] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1676.553582] [ 1676.659014] 9p: Unknown access argument À: -22 09:10:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x10c4, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:10:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x300000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:10:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x10, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:10:29 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 52) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:10:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={'L-', 0x9}, 0x16, 0x0) 09:10:29 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:10:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x20000}, {0x0, 0x0, 0x10000}]) 09:10:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 86) [ 1691.647365] loop6: detected capacity change from 0 to 256 [ 1691.690513] loop5: detected capacity change from 0 to 256 [ 1691.705399] 9p: Unknown access argument À: -22 [ 1691.707750] loop7: detected capacity change from 0 to 256 [ 1691.709433] 9p: Unknown access argument À: -22 [ 1691.754374] loop6: detected capacity change from 0 to 256 09:10:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x80000}, {0x0, 0x0, 0x10000}]) 09:10:29 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2311, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:10:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x700000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:10:42 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2500, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:10:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1100, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:10:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x900000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:10:42 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x11, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:10:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 87) 09:10:42 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 53) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:10:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000007c0)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x84c2e85078dd4f6b, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000500)=[&(0x7f0000000340)='\x00', &(0x7f0000000480)='trans=fd,', &(0x7f00000004c0)='+\']!\'&&{\x94\x00'], &(0x7f0000000740)=[&(0x7f0000000540)='dfltuid', &(0x7f0000000580)='\x81&\x00', &(0x7f00000005c0)='loose', &(0x7f0000000600)='dfltuid', &(0x7f0000000640)='dfltuid', &(0x7f0000000680)='@!]/}^', &(0x7f00000006c0)='privport', &(0x7f0000000700)='\\]^!,@\x00']) r3 = dup(r2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup(r4) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c6e6f6465766d61702cf8d145f7653d667363616368652c6c6f6f73652c64666c747569643d", @ANYRESHEX=0xee01, @ANYBLOB=',hash,seclabel,\x00']) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x102000, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fF,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',privport,uname=,uname=9p\x00,smackfsroot=9p\x00,smackfsroot=@!]/}^,\x00']) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000880)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000840)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x34}, 0x1, 0x0, 0x0, 0x44084}, 0x8000) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000780), 0x4) 09:10:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x200000}, {0x0, 0x0, 0x10000}]) [ 1705.095882] loop7: detected capacity change from 0 to 256 [ 1705.111407] FAULT_INJECTION: forcing a failure. [ 1705.111407] name failslab, interval 1, probability 0, space 0, times 0 [ 1705.112621] CPU: 0 PID: 9694 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1705.113164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1705.113716] Call Trace: [ 1705.113918] [ 1705.114073] dump_stack_lvl+0xc1/0xf0 [ 1705.114340] should_fail_ex+0x4b4/0x5b0 [ 1705.114622] should_failslab+0x9/0x20 [ 1705.114884] __kmem_cache_alloc_node+0x5b/0x310 [ 1705.115198] ? efi_partition+0x294/0x2930 [ 1705.115481] kmalloc_trace+0x26/0xc0 [ 1705.115737] efi_partition+0x294/0x2930 [ 1705.116002] ? __pfx_format_decode+0x10/0x10 [ 1705.116299] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1705.116653] ? __pfx_efi_partition+0x10/0x10 [ 1705.116663] loop5: detected capacity change from 0 to 256 [ 1705.116969] ? __alloc_pages+0x3a3/0x480 [ 1705.117000] ? __pfx___alloc_pages+0x10/0x10 [ 1705.118307] ? snprintf+0xbf/0x100 [ 1705.118552] ? __pfx_snprintf+0x10/0x10 [ 1705.118828] ? alloc_pages+0x1a8/0x260 [ 1705.119093] ? __pfx_efi_partition+0x10/0x10 [ 1705.119386] bdev_disk_changed+0x66c/0x1350 [ 1705.119681] loop_reread_partitions+0x70/0x140 [ 1705.119990] loop_set_status+0x4b8/0x860 [ 1705.120272] lo_ioctl+0x709/0x1990 [ 1705.120512] ? __pfx_lo_ioctl+0x10/0x10 [ 1705.120774] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1705.121166] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1705.121512] ? do_vfs_ioctl+0x132/0x1690 [ 1705.121821] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1705.122169] ? blkdev_common_ioctl+0x19e/0x1950 [ 1705.122498] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1705.122898] ? __pfx_blkdev_common_ioctl+0x10/0x10 [ 1705.123241] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1705.123664] ? __pfx_lock_release+0x10/0x10 [ 1705.123978] ? perf_trace_preemptirq_template+0x252/0x420 [ 1705.124361] ? __pfx_lo_ioctl+0x10/0x10 [ 1705.124637] blkdev_ioctl+0x35e/0x7e0 [ 1705.124912] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1705.125230] ? selinux_file_ioctl+0xba/0x270 [ 1705.125531] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1705.125861] __x64_sys_ioctl+0x19e/0x210 [ 1705.126173] do_syscall_64+0x3f/0x90 [ 1705.126458] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1705.126850] RIP: 0033:0x7f2fa42228d7 [ 1705.127130] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.128403] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 1705.128939] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa42228d7 [ 1705.129454] RDX: 00007f2fa1798050 RSI: 0000000000004c04 RDI: 0000000000000008 [ 1705.129984] RBP: 00007f2fa17981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1705.130494] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f2fa1798050 [ 1705.131003] R13: 00007ffe188d841f R14: 00007f2fa1798300 R15: 0000000000022000 [ 1705.131519] [ 1705.134707] loop6: detected capacity change from 0 to 256 [ 1705.168626] loop6: detected capacity change from 0 to 256 [ 1705.175847] FAULT_INJECTION: forcing a failure. [ 1705.175847] name failslab, interval 1, probability 0, space 0, times 0 [ 1705.177480] CPU: 1 PID: 9705 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1705.178497] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1705.179516] Call Trace: [ 1705.179849] [ 1705.180151] dump_stack_lvl+0xc1/0xf0 [ 1705.180668] should_fail_ex+0x4b4/0x5b0 [ 1705.181207] ? __kernfs_new_node+0xd4/0x870 [ 1705.181780] should_failslab+0x9/0x20 [ 1705.182295] kmem_cache_alloc+0x5a/0x390 [ 1705.182841] __kernfs_new_node+0xd4/0x870 [ 1705.183379] ? __pfx___kernfs_new_node+0x10/0x10 [ 1705.184002] ? down_write+0x11a/0x1f0 [ 1705.184513] ? up_write+0x196/0x510 [ 1705.185002] kernfs_new_node+0x97/0x120 [ 1705.185529] __kernfs_create_file+0x55/0x350 [ 1705.186125] sysfs_add_file_mode_ns+0x21c/0x440 [ 1705.186727] ? __pfx_slab_attr_store+0x10/0x10 [ 1705.187324] internal_create_group+0x322/0xb90 [ 1705.187916] ? __pfx_internal_create_group+0x10/0x10 [ 1705.188548] ? up_write+0x196/0x510 [ 1705.189059] sysfs_slab_add+0x18e/0x220 [ 1705.189575] __kmem_cache_create+0x1fe/0x610 [ 1705.190170] kmem_cache_create_usercopy+0x218/0x340 [ 1705.190817] p9_client_create+0xd0b/0x1260 [ 1705.191361] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1705.192008] ? __pfx_p9_client_create+0x10/0x10 [ 1705.192602] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1705.193228] ? lockdep_init_map_type+0x21e/0x7e0 [ 1705.193847] ? __kasan_kmalloc+0x7f/0x90 [ 1705.194385] ? __raw_spin_lock_init+0x3a/0x110 [ 1705.194979] v9fs_session_init+0x1e0/0x17b0 [ 1705.195540] ? __pfx_lock_release+0x10/0x10 [ 1705.196087] ? __pfx_v9fs_session_init+0x10/0x10 [ 1705.196692] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1705.197350] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1705.197971] ? v9fs_mount+0x9e/0xbd0 [ 1705.198473] v9fs_mount+0xbd/0xbd0 [ 1705.198945] ? legacy_init_fs_context+0x44/0xe0 [ 1705.199548] ? __pfx_v9fs_mount+0x10/0x10 [ 1705.200082] ? cap_capable+0x1be/0x220 [ 1705.200593] ? __pfx_v9fs_mount+0x10/0x10 [ 1705.201126] legacy_get_tree+0x109/0x220 [ 1705.201651] vfs_get_tree+0x92/0x360 [ 1705.202168] path_mount+0x133c/0x1e50 [ 1705.202683] ? kasan_quarantine_put+0x81/0x1d0 [ 1705.203269] ? __pfx_path_mount+0x10/0x10 [ 1705.203801] ? putname+0x102/0x140 [ 1705.204261] ? kmem_cache_free+0xff/0x4a0 [ 1705.204798] ? putname+0x102/0x140 [ 1705.205271] __x64_sys_mount+0x286/0x310 [ 1705.205780] ? __pfx___x64_sys_mount+0x10/0x10 [ 1705.206354] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1705.207011] do_syscall_64+0x3f/0x90 [ 1705.207493] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1705.208138] RIP: 0033:0x7f378de9bb19 [ 1705.208597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.210749] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1705.211661] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1705.212622] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1705.213612] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1705.214626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1705.215622] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1705.216658] 09:10:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xf0ffff}, {0x0, 0x0, 0x10000}]) [ 1705.240538] kmem_cache_create_usercopy(9p-fcall-cache) failed with error -12 [ 1705.241096] CPU: 0 PID: 9705 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1705.241640] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1705.242195] Call Trace: [ 1705.242376] [ 1705.242559] dump_stack_lvl+0xc1/0xf0 [ 1705.242844] kmem_cache_create_usercopy+0x12b/0x340 [ 1705.243204] p9_client_create+0xd0b/0x1260 [ 1705.243506] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1705.243870] ? __pfx_p9_client_create+0x10/0x10 [ 1705.244201] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1705.244545] ? lockdep_init_map_type+0x21e/0x7e0 [ 1705.244875] ? __kasan_kmalloc+0x7f/0x90 [ 1705.245171] ? __raw_spin_lock_init+0x3a/0x110 [ 1705.245501] v9fs_session_init+0x1e0/0x17b0 [ 1705.245806] ? __pfx_lock_release+0x10/0x10 [ 1705.246110] ? __pfx_v9fs_session_init+0x10/0x10 [ 1705.246449] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1705.246810] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1705.247160] ? v9fs_mount+0x9e/0xbd0 [ 1705.247443] v9fs_mount+0xbd/0xbd0 [ 1705.247702] ? legacy_init_fs_context+0x44/0xe0 [ 1705.248012] ? __pfx_v9fs_mount+0x10/0x10 [ 1705.248308] ? cap_capable+0x1be/0x220 [ 1705.248585] ? __pfx_v9fs_mount+0x10/0x10 [ 1705.248884] legacy_get_tree+0x109/0x220 [ 1705.249167] vfs_get_tree+0x92/0x360 [ 1705.249457] path_mount+0x133c/0x1e50 [ 1705.249725] ? kasan_quarantine_put+0x81/0x1d0 [ 1705.250097] ? __pfx_path_mount+0x10/0x10 [ 1705.250413] ? putname+0x102/0x140 [ 1705.250688] ? kmem_cache_free+0xff/0x4a0 [ 1705.251004] ? putname+0x102/0x140 [ 1705.251280] __x64_sys_mount+0x286/0x310 [ 1705.251580] ? __pfx___x64_sys_mount+0x10/0x10 [ 1705.251913] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1705.252306] do_syscall_64+0x3f/0x90 [ 1705.252569] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1705.252960] RIP: 0033:0x7f378de9bb19 [ 1705.253229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.254349] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1705.254889] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1705.255399] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1705.255902] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1705.256409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1705.256914] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1705.257445] 09:10:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1105, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1705.295992] 9p: Unknown access argument À: -22 [ 1705.340512] loop5: detected capacity change from 0 to 256 [ 1705.359200] 9p: Unknown access argument À: -22 [ 1705.514636] 9p: Unknown access argument À: -22 [ 1717.313837] loop6: detected capacity change from 0 to 256 09:10:55 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 54) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:10:55 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2c02, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:10:55 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d666493fe2c7266646e", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x14d800) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x3, 0xff, 0xfff, 0x2c, @mcast1, @loopback, 0x8050, 0x8000, 0x0, 0x6f}}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@private1, 0x14, r4}) 09:10:55 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x12, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:10:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x1000000}, {0x0, 0x0, 0x10000}]) 09:10:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1200, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:10:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 88) 09:10:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x1000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1717.337760] loop5: detected capacity change from 0 to 256 [ 1717.349381] loop7: detected capacity change from 0 to 256 [ 1717.371678] loop6: detected capacity change from 0 to 256 09:10:55 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:10:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x2000000}, {0x0, 0x0, 0x10000}]) [ 1717.402059] 9p: Unknown access argument À: -22 09:10:55 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 55) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:10:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:10:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:10:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 89) 09:10:55 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x48, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:10:55 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1717.517828] loop7: detected capacity change from 0 to 256 [ 1717.543234] FAULT_INJECTION: forcing a failure. [ 1717.543234] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1717.544883] CPU: 1 PID: 9755 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1717.545875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.546860] Call Trace: [ 1717.547186] [ 1717.547473] dump_stack_lvl+0xc1/0xf0 [ 1717.547973] should_fail_ex+0x4b4/0x5b0 [ 1717.548504] __should_fail_alloc_page+0xe0/0x110 [ 1717.549106] prepare_alloc_pages+0x178/0x500 [ 1717.549684] __alloc_pages+0x149/0x480 [ 1717.550252] ? __pfx___alloc_pages+0x10/0x10 [ 1717.550867] alloc_pages+0x1a0/0x260 [ 1717.551352] __get_free_pages+0x10/0xb0 [ 1717.551856] bdev_disk_changed+0x3a3/0x1350 [ 1717.552395] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1717.553062] loop_reread_partitions+0x70/0x140 [ 1717.553646] loop_set_status+0x4b8/0x860 [ 1717.554187] lo_ioctl+0x709/0x1990 [ 1717.554652] ? __pfx_lo_ioctl+0x10/0x10 [ 1717.555150] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1717.555831] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1717.556560] ? __pfx_lock_release+0x10/0x10 [ 1717.557100] ? perf_trace_lock+0xc1/0x480 [ 1717.557622] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1717.558302] ? do_vfs_ioctl+0x132/0x1690 [ 1717.558836] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1717.559486] ? blkdev_common_ioctl+0x19e/0x1950 [ 1717.560088] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1717.560819] ? __pfx_blkdev_common_ioctl+0x10/0x10 [ 1717.561432] ? __destroy_inode+0x62c/0x750 [ 1717.561972] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1717.562702] loop6: detected capacity change from 0 to 256 [ 1717.562733] ? __pfx_lock_release+0x10/0x10 [ 1717.563689] ? perf_trace_preemptirq_template+0x252/0x420 [ 1717.564372] ? __pfx_lo_ioctl+0x10/0x10 [ 1717.564869] blkdev_ioctl+0x35e/0x7e0 [ 1717.565359] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1717.565923] ? selinux_file_ioctl+0xba/0x270 [ 1717.566500] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1717.567051] __x64_sys_ioctl+0x19e/0x210 [ 1717.567584] do_syscall_64+0x3f/0x90 [ 1717.568069] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1717.568732] RIP: 0033:0x7f2fa42228d7 [ 1717.569196] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.571325] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 1717.572228] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa42228d7 [ 1717.573071] RDX: 00007f2fa1798050 RSI: 0000000000004c04 RDI: 0000000000000008 [ 1717.573919] RBP: 00007f2fa17981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1717.574765] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f2fa1798050 [ 1717.575611] R13: 00007ffe188d841f R14: 00007f2fa1798300 R15: 0000000000022000 [ 1717.576488] [ 1717.589694] loop5: detected capacity change from 0 to 256 [ 1717.646375] 9pnet: Could not find request transport: fd“þ [ 1717.661583] FAULT_INJECTION: forcing a failure. [ 1717.661583] name failslab, interval 1, probability 0, space 0, times 0 [ 1717.662375] CPU: 0 PID: 9771 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1717.662889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.663434] Call Trace: [ 1717.663608] [ 1717.663773] dump_stack_lvl+0xc1/0xf0 [ 1717.664049] should_fail_ex+0x4b4/0x5b0 [ 1717.664341] ? __kernfs_new_node+0xd4/0x870 [ 1717.664633] should_failslab+0x9/0x20 [ 1717.664909] kmem_cache_alloc+0x5a/0x390 [ 1717.665191] __kernfs_new_node+0xd4/0x870 [ 1717.665484] ? __pfx___kernfs_new_node+0x10/0x10 [ 1717.665800] ? down_write+0x11a/0x1f0 [ 1717.666099] ? up_write+0x196/0x510 [ 1717.666357] kernfs_new_node+0x97/0x120 [ 1717.666647] __kernfs_create_file+0x55/0x350 [ 1717.666952] sysfs_add_file_mode_ns+0x21c/0x440 [ 1717.667278] ? __pfx_slab_attr_store+0x10/0x10 [ 1717.667594] internal_create_group+0x322/0xb90 [ 1717.667923] ? __pfx_internal_create_group+0x10/0x10 [ 1717.668258] ? up_write+0x196/0x510 [ 1717.668526] sysfs_slab_add+0x18e/0x220 [ 1717.668795] __kmem_cache_create+0x1fe/0x610 [ 1717.669111] kmem_cache_create_usercopy+0x218/0x340 [ 1717.669450] p9_client_create+0xd0b/0x1260 [ 1717.669760] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1717.670113] ? __pfx_p9_client_create+0x10/0x10 [ 1717.670443] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1717.670776] ? lockdep_init_map_type+0x21e/0x7e0 [ 1717.671127] ? __kasan_kmalloc+0x7f/0x90 [ 1717.671436] ? __raw_spin_lock_init+0x3a/0x110 [ 1717.671744] v9fs_session_init+0x1e0/0x17b0 [ 1717.672071] ? __pfx_lock_release+0x10/0x10 [ 1717.672361] ? __pfx_v9fs_session_init+0x10/0x10 [ 1717.672716] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1717.673061] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1717.673430] ? v9fs_mount+0x9e/0xbd0 [ 1717.673698] v9fs_mount+0xbd/0xbd0 [ 1717.673974] ? legacy_init_fs_context+0x44/0xe0 [ 1717.674284] ? __pfx_v9fs_mount+0x10/0x10 [ 1717.674591] ? cap_capable+0x1be/0x220 [ 1717.674866] ? __pfx_v9fs_mount+0x10/0x10 [ 1717.675180] legacy_get_tree+0x109/0x220 [ 1717.675459] vfs_get_tree+0x92/0x360 [ 1717.675745] path_mount+0x133c/0x1e50 [ 1717.676019] ? kasan_quarantine_put+0x81/0x1d0 [ 1717.676358] ? __pfx_path_mount+0x10/0x10 [ 1717.676638] ? putname+0x102/0x140 [ 1717.676916] ? kmem_cache_free+0xff/0x4a0 [ 1717.677195] ? putname+0x102/0x140 [ 1717.677475] __x64_sys_mount+0x286/0x310 [ 1717.677740] ? __pfx___x64_sys_mount+0x10/0x10 [ 1717.678090] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1717.678436] do_syscall_64+0x3f/0x90 [ 1717.678717] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1717.679064] RIP: 0033:0x7f378de9bb19 [ 1717.679335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.680453] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1717.680989] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1717.681439] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1717.681885] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1717.682345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1717.682789] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1717.683251] [ 1717.693831] kmem_cache_create_usercopy(9p-fcall-cache) failed with error -12 [ 1717.694395] CPU: 0 PID: 9771 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1717.694905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.695408] Call Trace: [ 1717.695576] [ 1717.695729] dump_stack_lvl+0xc1/0xf0 [ 1717.695989] kmem_cache_create_usercopy+0x12b/0x340 [ 1717.696320] p9_client_create+0xd0b/0x1260 [ 1717.696602] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1717.696964] ? __pfx_p9_client_create+0x10/0x10 [ 1717.697270] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1717.697618] ? lockdep_init_map_type+0x21e/0x7e0 [ 1717.697938] ? __kasan_kmalloc+0x7f/0x90 [ 1717.698231] ? __raw_spin_lock_init+0x3a/0x110 [ 1717.698537] v9fs_session_init+0x1e0/0x17b0 [ 1717.698827] ? __pfx_lock_release+0x10/0x10 [ 1717.699127] ? __pfx_v9fs_session_init+0x10/0x10 [ 1717.699441] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1717.699802] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1717.700127] ? v9fs_mount+0x9e/0xbd0 [ 1717.700403] v9fs_mount+0xbd/0xbd0 [ 1717.700651] ? legacy_init_fs_context+0x44/0xe0 [ 1717.700969] ? __pfx_v9fs_mount+0x10/0x10 [ 1717.701250] ? cap_capable+0x1be/0x220 [ 1717.701538] ? __pfx_v9fs_mount+0x10/0x10 [ 1717.701818] legacy_get_tree+0x109/0x220 [ 1717.702121] vfs_get_tree+0x92/0x360 [ 1717.702383] path_mount+0x133c/0x1e50 [ 1717.702665] ? kasan_quarantine_put+0x81/0x1d0 [ 1717.702972] ? __pfx_path_mount+0x10/0x10 [ 1717.703268] ? putname+0x102/0x140 [ 1717.703516] ? kmem_cache_free+0xff/0x4a0 [ 1717.703858] ? putname+0x102/0x140 [ 1717.704156] __x64_sys_mount+0x286/0x310 [ 1717.704479] ? __pfx___x64_sys_mount+0x10/0x10 [ 1717.704860] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1717.705298] do_syscall_64+0x3f/0x90 [ 1717.705628] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1717.706080] RIP: 0033:0x7f378de9bb19 [ 1717.706342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.707874] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1717.708359] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1717.708957] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1717.709570] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1717.710184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1717.710784] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1717.711410] [ 1717.713020] 9p: Unknown access argument À: -22 [ 1717.717655] 9pnet: Could not find request transport: fd“þ 09:11:09 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 56) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:11:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 90) 09:11:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2010000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:11:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x3000000}, {0x0, 0x0, 0x10000}]) [ 1731.939043] loop5: detected capacity change from 0 to 256 09:11:09 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x4e00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:11:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x4c, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:11:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f00, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:11:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="d5449f4d3e48b0f547372469885699f2351fa90071b36fb22bcf5815c7490f1565aa7ee7a08903ec90a7d460fe2fd39ff409dd90a895c20e745070b8d4ca97bf893f1383a5a513c058f5"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:11:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x358d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:11:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1732.000971] 9p: Unknown access argument À: -22 [ 1732.037518] loop6: detected capacity change from 0 to 256 [ 1732.042694] 9pnet_fd: Insufficient options for proto=fd [ 1732.047209] loop5: detected capacity change from 0 to 256 09:11:09 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x6500, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:11:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x4000000}, {0x0, 0x0, 0x10000}]) 09:11:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 91) [ 1732.081404] loop7: detected capacity change from 0 to 256 [ 1732.095854] 9pnet_fd: Insufficient options for proto=fd 09:11:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4800, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1732.147269] loop6: detected capacity change from 0 to 256 [ 1732.152817] loop5: detected capacity change from 0 to 256 09:11:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x368d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:11:09 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x8004, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1732.197395] FAULT_INJECTION: forcing a failure. [ 1732.197395] name failslab, interval 1, probability 0, space 0, times 0 [ 1732.199185] CPU: 0 PID: 9821 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1732.200223] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1732.201528] Call Trace: [ 1732.201877] [ 1732.202207] dump_stack_lvl+0xc1/0xf0 [ 1732.202737] should_fail_ex+0x4b4/0x5b0 [ 1732.203294] ? __kernfs_new_node+0xd4/0x870 [ 1732.203867] should_failslab+0x9/0x20 [ 1732.204393] kmem_cache_alloc+0x5a/0x390 [ 1732.204951] __kernfs_new_node+0xd4/0x870 [ 1732.205522] ? __pfx___kernfs_new_node+0x10/0x10 [ 1732.206174] ? down_write+0x11a/0x1f0 [ 1732.206704] ? up_write+0x196/0x510 [ 1732.207259] kernfs_new_node+0x97/0x120 [ 1732.207859] __kernfs_create_file+0x55/0x350 [ 1732.208501] sysfs_add_file_mode_ns+0x21c/0x440 [ 1732.209144] ? __pfx_slab_attr_store+0x10/0x10 [ 1732.209836] internal_create_group+0x322/0xb90 [ 1732.210533] ? __pfx_internal_create_group+0x10/0x10 [ 1732.211224] ? up_write+0x196/0x510 [ 1732.211763] sysfs_slab_add+0x18e/0x220 [ 1732.212313] __kmem_cache_create+0x1fe/0x610 [ 1732.212945] kmem_cache_create_usercopy+0x218/0x340 [ 1732.213640] p9_client_create+0xd0b/0x1260 [ 1732.214286] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1732.215047] ? __pfx_p9_client_create+0x10/0x10 [ 1732.215684] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1732.216408] ? lockdep_init_map_type+0x21e/0x7e0 [ 1732.217109] ? __kasan_kmalloc+0x7f/0x90 [ 1732.217684] ? __raw_spin_lock_init+0x3a/0x110 [ 1732.218337] v9fs_session_init+0x1e0/0x17b0 [ 1732.218949] ? __pfx_lock_release+0x10/0x10 [ 1732.219545] ? __pfx_v9fs_session_init+0x10/0x10 [ 1732.220252] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1732.221041] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1732.221723] ? v9fs_mount+0x9e/0xbd0 [ 1732.222291] v9fs_mount+0xbd/0xbd0 [ 1732.222815] ? legacy_init_fs_context+0x44/0xe0 [ 1732.223495] ? __pfx_v9fs_mount+0x10/0x10 [ 1732.224076] ? cap_capable+0x1be/0x220 [ 1732.224646] ? __pfx_v9fs_mount+0x10/0x10 [ 1732.225282] legacy_get_tree+0x109/0x220 [ 1732.225861] vfs_get_tree+0x92/0x360 [ 1732.226442] path_mount+0x133c/0x1e50 [ 1732.226998] ? kasan_quarantine_put+0x81/0x1d0 [ 1732.227652] ? __pfx_path_mount+0x10/0x10 [ 1732.228270] ? putname+0x102/0x140 [ 1732.228776] ? kmem_cache_free+0xff/0x4a0 [ 1732.229359] ? putname+0x102/0x140 [ 1732.229889] __x64_sys_mount+0x286/0x310 [ 1732.230489] ? __pfx___x64_sys_mount+0x10/0x10 [ 1732.231149] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1732.231938] do_syscall_64+0x3f/0x90 [ 1732.232498] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1732.233212] RIP: 0033:0x7f378de9bb19 [ 1732.233760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1732.236338] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1732.237431] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1732.238475] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1732.239407] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1732.240440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1732.241455] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1732.242523] [ 1732.290420] kmem_cache_create_usercopy(9p-fcall-cache) failed with error -12 [ 1732.290961] CPU: 1 PID: 9821 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1732.291480] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1732.291989] Call Trace: [ 1732.292162] [ 1732.292317] dump_stack_lvl+0xc1/0xf0 [ 1732.292595] kmem_cache_create_usercopy+0x12b/0x340 [ 1732.292933] p9_client_create+0xd0b/0x1260 [ 1732.293217] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1732.293562] ? __pfx_p9_client_create+0x10/0x10 [ 1732.293867] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1732.294203] ? lockdep_init_map_type+0x21e/0x7e0 [ 1732.294511] ? __kasan_kmalloc+0x7f/0x90 [ 1732.294792] ? __raw_spin_lock_init+0x3a/0x110 [ 1732.295101] v9fs_session_init+0x1e0/0x17b0 [ 1732.295402] ? __pfx_lock_release+0x10/0x10 [ 1732.295689] ? __pfx_v9fs_session_init+0x10/0x10 [ 1732.296007] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1732.296355] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1732.296678] ? v9fs_mount+0x9e/0xbd0 [ 1732.296946] v9fs_mount+0xbd/0xbd0 [ 1732.297198] ? legacy_init_fs_context+0x44/0xe0 [ 1732.297541] ? __pfx_v9fs_mount+0x10/0x10 [ 1732.297825] ? cap_capable+0x1be/0x220 [ 1732.298137] ? __pfx_v9fs_mount+0x10/0x10 [ 1732.298424] legacy_get_tree+0x109/0x220 [ 1732.298731] vfs_get_tree+0x92/0x360 [ 1732.298996] path_mount+0x133c/0x1e50 [ 1732.299266] ? kasan_quarantine_put+0x81/0x1d0 [ 1732.299595] ? __pfx_path_mount+0x10/0x10 [ 1732.299879] ? putname+0x102/0x140 [ 1732.300148] ? kmem_cache_free+0xff/0x4a0 [ 1732.300430] ? putname+0x102/0x140 [ 1732.300697] __x64_sys_mount+0x286/0x310 [ 1732.300967] ? __pfx___x64_sys_mount+0x10/0x10 [ 1732.301288] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1732.301632] do_syscall_64+0x3f/0x90 [ 1732.301909] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1732.302268] RIP: 0033:0x7f378de9bb19 [ 1732.302513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1732.303631] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1732.304103] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1732.304544] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1732.304988] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1732.305438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1732.305881] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1732.306347] [ 1732.323185] 9p: Unknown access argument À: -22 09:11:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x5000000}, {0x0, 0x0, 0x10000}]) 09:11:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 92) 09:11:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x378d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:11:22 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:11:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="b254362b33f70ed5161d491f434f74726e6f3d000000000000000400000e13663ecb0700000000000000d2", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c6163636573733dc0"]) sendmmsg$inet6(r1, &(0x7f0000003bc0)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x3f}, 0x1c, &(0x7f00000015c0)=[{&(0x7f0000000240)="1be6a08846afdaaae381f2c1335a9e1cb8104fed0986ad742ac2e2c8a818f08cc116ca4228c91155fe21bdc32201d5391219abfa465d92ef85736f63666bb7ed1c3a2210276d1771f4d8f253696287cb1af23e72601b59b3245ec416570cd735d56ff02270b68897c35252f5724e39e11eaa55f9d67d08fcac5864d9640676c6e5319c37de1d", 0x86}, {&(0x7f0000000440)="2e1cf844163910fbfd69bea7db6a46b58940ca0902c3b4572f356c06ed3f19a4a39df9c6f51fe364237044a23aad34ddb363639836624a9a6529fdc1d98cb839d751c8b567288f21edb09135fbc1d8323c3520ba68b21fd6c1a00b6c0d67d03fef7a3686b5dadaf6e2af776e9ea4da65d0cf45a0fa50c64f97b7fa3d53cfa53ad9", 0x81}, {&(0x7f0000000500)="8ea61a7b66ea33e52d44e06fa9d46b4473c490d152c57a84f5ceed1d76ba85d71bec162cbbe22f4a2ede1ee13a1ae7140705f88ac27569de0a6c47d282bd4e23e88c02c64bcdec05de38372b56d917521a7ef834854d1d5812a2ce30e53cb922b982a09010f19c8a4e9394b14e8110ec9c9a6e980eee479f90446be72a0cfec71beb08b9748c4cd38b4757766dc2d8787b933d21413a1a17e94a7d96e68c82ac2ca0f911fe20", 0xa6}, {&(0x7f0000000300)="7e0645d857e64750350fb94697c7dd19e5e69291ac1ab3fa57b23eea7c3fec8ee2028101ac57275fd05d74ab6f8f9d452cd35190ff64bb49437efe70095c9afdf375e3a52e45a08115a17c0ad2ea4a05f8e2f4b65065e50b1e5677cfee15a001689f8ae8f7f7eafac5d14e7274bf4902776423bf11", 0x75}, {&(0x7f00000005c0)="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", 0x1000}], 0x5, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x1080}}, {{0x0, 0x0, &(0x7f0000003900)=[{&(0x7f00000026c0)="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", 0x1000}, {&(0x7f0000000180)="fd6514e6c9c48605b0bccc4d649fe4425ce5ce946f6a99dc5241db74cb9d0d5aeb83be869161cf8eb0105e633792aa4ee11598ff90b4", 0x36}, {&(0x7f00000036c0)="fe7b3909f89811847031e75d7af34859808190f0cbeef568fa9bae221fb417c27c8fa98aea6c9ca22d3224cbc390a850f7ca6f4de3a7ff6f6788d83365678896cb7a7f59311a397d6231082e703e58eaea1fbbe7743cd15357ea879f2cb59b2f5601d7fcb257f4d7a0a01f193c321cc32847188d4d44f7ba78a93ea275b1afb7cd38e22cd1ffe167e6b76c314916e6a1bbeb0649", 0x94}, {&(0x7f0000003780)="49a000e10a16d84d4d50fabe900103a93e1c53d3a2cf5f84c73b5dc2fd4a836307a7d14321d44cbf1590f1e45b657f7e82c7816b8a15d548120670b8202131d629ab0910519d0e9894050cd7b6fe87c97965e3b3b3a30412e41b7c859c9d3c1b3e88f6dead", 0x65}, {&(0x7f0000003800)="c2353a60c2e6f79f9a9750462c9010485fc96ac875d50e1990b7141a3b49691fab64f4b31290fd7bd27c64f0dad47a61298cbd7fe5b4c011e39b451cc1a2813d0dc1ed48a3e7316c8e87d8fd14d7cbc91e07eed05643a2affb0e8be1670e8423e816e16cd7935ca51ab3f5d5b9eda8e77e3ec8d1598301aa78efaff3c250f8d418125d0a93917b303229a7c6fe239dd81741984fd1a7bf3709", 0x99}, {&(0x7f00000038c0)="1d2549727db5c0408907190e2ed3a8c8cd3de553e26a41f5e10efddb562c", 0x1e}], 0x6, &(0x7f0000003c40)=ANY=[@ANYBLOB="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"], 0x230}}], 0x2, 0x20008005) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:11:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4c00, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:11:22 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 57) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:11:22 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x55, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1745.037431] 9p: Unknown access argument À: -22 [ 1745.063391] loop5: detected capacity change from 0 to 256 [ 1745.067452] loop6: detected capacity change from 0 to 256 [ 1745.073351] loop7: detected capacity change from 0 to 256 [ 1745.095510] FAULT_INJECTION: forcing a failure. [ 1745.095510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1745.097340] CPU: 0 PID: 9842 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1745.098107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1745.098885] Call Trace: [ 1745.099143] [ 1745.099371] dump_stack_lvl+0xc1/0xf0 [ 1745.099765] should_fail_ex+0x4b4/0x5b0 [ 1745.100176] strncpy_from_user+0x38/0x340 [ 1745.100595] getname_flags.part.0+0x95/0x4f0 [ 1745.101046] getname_flags+0x9e/0xf0 [ 1745.101415] vfs_fstatat+0x77/0xb0 [ 1745.101787] __do_sys_newstat+0x81/0x100 [ 1745.102195] ? __pfx___do_sys_newstat+0x10/0x10 [ 1745.102676] ? perf_trace_preemptirq_template+0x252/0x420 [ 1745.103215] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1745.103784] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1745.104361] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1745.104794] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1745.105306] ? syscall_enter_from_user_mode+0x21/0x50 [ 1745.105813] do_syscall_64+0x3f/0x90 [ 1745.106192] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1745.106706] RIP: 0033:0x7f2fa4221b16 [ 1745.107066] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1745.108732] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1745.109442] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1745.110104] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1745.110772] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1745.111433] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000001 [ 1745.112094] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1745.112780] [ 1745.131693] loop6: detected capacity change from 0 to 256 09:11:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x6000000}, {0x0, 0x0, 0x10000}]) 09:11:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 93) 09:11:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5500, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:11:22 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x68, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:11:22 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xff03, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:11:22 executing program 1: prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, r4, 0x301, 0x0, 0x0, {0x6}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}]}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0xe00) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000440)={'ip6gre0\x00', r6, 0x29, 0xd1, 0x7, 0x9, 0x48, @private2={0xfc, 0x2, '\x00', 0x7}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10, 0x7800, 0x0, 0x81}}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000004c0)={@empty, @loopback, 0x0}, &(0x7f0000000500)=0xc) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)={0x1f8, 0x0, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5716bc543b2d8e1c}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x8000}, 0x44010) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r9 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x2000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r9, 0x0) pread64(r9, &(0x7f0000000100)=""/167, 0xa7, 0x5eda0646) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c616573733dc00004"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1745.243644] FAULT_INJECTION: forcing a failure. [ 1745.243644] name failslab, interval 1, probability 0, space 0, times 0 [ 1745.244705] CPU: 0 PID: 9859 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1745.245424] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1745.246159] Call Trace: [ 1745.246423] [ 1745.246641] dump_stack_lvl+0xc1/0xf0 [ 1745.247019] should_fail_ex+0x4b4/0x5b0 [ 1745.247417] ? __kernfs_new_node+0xd4/0x870 [ 1745.247826] should_failslab+0x9/0x20 [ 1745.248196] kmem_cache_alloc+0x5a/0x390 [ 1745.248595] __kernfs_new_node+0xd4/0x870 [ 1745.248986] ? __pfx___kernfs_new_node+0x10/0x10 [ 1745.249434] ? down_write+0x11a/0x1f0 [ 1745.249803] ? up_write+0x196/0x510 [ 1745.250168] kernfs_new_node+0x97/0x120 [ 1745.250562] __kernfs_create_file+0x55/0x350 [ 1745.250989] sysfs_add_file_mode_ns+0x21c/0x440 [ 1745.251423] ? __pfx_slab_attr_store+0x10/0x10 [ 1745.251862] internal_create_group+0x322/0xb90 [ 1745.252298] ? __pfx_internal_create_group+0x10/0x10 [ 1745.252775] ? up_write+0x196/0x510 [ 1745.253137] sysfs_slab_add+0x18e/0x220 [ 1745.253517] __kmem_cache_create+0x1fe/0x610 [ 1745.253942] kmem_cache_create_usercopy+0x218/0x340 [ 1745.254433] p9_client_create+0xd0b/0x1260 [ 1745.254835] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1745.255313] ? __pfx_p9_client_create+0x10/0x10 [ 1745.255750] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1745.256210] ? lockdep_init_map_type+0x21e/0x7e0 [ 1745.256643] ? __kasan_kmalloc+0x7f/0x90 [ 1745.257032] ? __raw_spin_lock_init+0x3a/0x110 [ 1745.257462] v9fs_session_init+0x1e0/0x17b0 [ 1745.257879] ? __pfx_lock_release+0x10/0x10 [ 1745.258291] ? __pfx_v9fs_session_init+0x10/0x10 [ 1745.258748] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1745.259228] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1745.259685] ? v9fs_mount+0x9e/0xbd0 [ 1745.260060] v9fs_mount+0xbd/0xbd0 [ 1745.260409] ? legacy_init_fs_context+0x44/0xe0 [ 1745.260844] ? __pfx_v9fs_mount+0x10/0x10 [ 1745.261238] ? cap_capable+0x1be/0x220 [ 1745.261616] ? __pfx_v9fs_mount+0x10/0x10 [ 1745.262008] legacy_get_tree+0x109/0x220 [ 1745.262411] vfs_get_tree+0x92/0x360 [ 1745.262772] path_mount+0x133c/0x1e50 [ 1745.263144] ? kasan_quarantine_put+0x81/0x1d0 [ 1745.263576] ? __pfx_path_mount+0x10/0x10 [ 1745.263975] ? putname+0x102/0x140 [ 1745.264318] ? kmem_cache_free+0xff/0x4a0 [ 1745.264709] ? putname+0x102/0x140 [ 1745.265058] __x64_sys_mount+0x286/0x310 [ 1745.265429] ? __pfx___x64_sys_mount+0x10/0x10 [ 1745.265855] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1745.266354] do_syscall_64+0x3f/0x90 [ 1745.266717] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1745.267203] RIP: 0033:0x7f378de9bb19 [ 1745.267545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1745.269111] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1745.269783] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1745.270410] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1745.271032] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1745.271660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1745.272285] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1745.272931] [ 1745.284665] loop6: detected capacity change from 0 to 256 09:11:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x388d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1745.290835] loop5: detected capacity change from 0 to 256 09:11:23 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 58) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1745.337291] loop6: detected capacity change from 0 to 256 09:11:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6800, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1745.350762] loop7: detected capacity change from 0 to 256 [ 1745.359401] FAULT_INJECTION: forcing a failure. [ 1745.359401] name failslab, interval 1, probability 0, space 0, times 0 [ 1745.360698] CPU: 0 PID: 9873 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1745.361370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1745.362048] Call Trace: [ 1745.362285] [ 1745.362486] dump_stack_lvl+0xc1/0xf0 [ 1745.362831] should_fail_ex+0x4b4/0x5b0 [ 1745.363189] should_failslab+0x9/0x20 [ 1745.363527] kmem_cache_alloc_lru+0x6b/0x600 [ 1745.363915] ? __d_alloc+0x31/0x9c0 [ 1745.364248] __d_alloc+0x31/0x9c0 [ 1745.364556] ? __lock_acquire+0x19b1/0x6340 [ 1745.364933] d_alloc_parallel+0x10e/0x1640 [ 1745.365318] ? __pfx___lock_acquire+0x10/0x10 [ 1745.365706] ? __pfx_d_alloc_parallel+0x10/0x10 [ 1745.366114] ? lockdep_init_map_type+0x21e/0x7e0 [ 1745.366526] ? lockdep_init_map_type+0x21e/0x7e0 [ 1745.366957] __lookup_slow+0x193/0x470 [ 1745.367279] ? __pfx___lookup_slow+0x10/0x10 [ 1745.367670] ? lookup_fast+0x14e/0x530 [ 1745.368015] walk_component+0x345/0x5b0 [ 1745.368354] path_lookupat+0x1ba/0x850 [ 1745.368699] filename_lookup+0x1d2/0x590 [ 1745.369055] ? __pfx_filename_lookup+0x10/0x10 [ 1745.369460] ? find_held_lock+0x2c/0x110 [ 1745.369819] ? __might_fault+0xe2/0x190 [ 1745.370162] ? lock_release+0x1e3/0x680 [ 1745.370525] ? __virt_addr_valid+0x102/0x340 [ 1745.370911] vfs_statx+0x14c/0x430 [ 1745.371237] ? __pfx_vfs_statx+0x10/0x10 [ 1745.371590] ? getname_flags.part.0+0x1dd/0x4f0 [ 1745.372004] vfs_fstatat+0x90/0xb0 [ 1745.372325] __do_sys_newstat+0x81/0x100 [ 1745.372680] ? __pfx___do_sys_newstat+0x10/0x10 [ 1745.373087] ? perf_trace_preemptirq_template+0x252/0x420 [ 1745.373565] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1745.374059] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1745.374571] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1745.374956] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1745.375402] ? syscall_enter_from_user_mode+0x21/0x50 [ 1745.375852] do_syscall_64+0x3f/0x90 [ 1745.376183] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1745.376634] RIP: 0033:0x7f2fa4221b16 [ 1745.376950] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1745.378426] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1745.379046] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1745.379627] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1745.380211] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1745.380795] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000001 [ 1745.381385] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1745.381990] 09:11:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x7000000}, {0x0, 0x0, 0x10000}]) [ 1745.386592] kmem_cache_create_usercopy(9p-fcall-cache) failed with error -12 [ 1745.387249] CPU: 0 PID: 9859 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1745.387918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1745.388587] Call Trace: [ 1745.388807] [ 1745.389002] dump_stack_lvl+0xc1/0xf0 [ 1745.389343] kmem_cache_create_usercopy+0x12b/0x340 [ 1745.389777] p9_client_create+0xd0b/0x1260 [ 1745.390145] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1745.390590] ? __pfx_p9_client_create+0x10/0x10 [ 1745.390991] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1745.391410] ? lockdep_init_map_type+0x21e/0x7e0 [ 1745.391813] ? __kasan_kmalloc+0x7f/0x90 [ 1745.392168] ? __raw_spin_lock_init+0x3a/0x110 [ 1745.392563] v9fs_session_init+0x1e0/0x17b0 [ 1745.392945] ? __pfx_lock_release+0x10/0x10 [ 1745.393311] ? __pfx_v9fs_session_init+0x10/0x10 [ 1745.393720] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1745.394161] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1745.394587] ? v9fs_mount+0x9e/0xbd0 [ 1745.394926] v9fs_mount+0xbd/0xbd0 [ 1745.395238] ? legacy_init_fs_context+0x44/0xe0 [ 1745.395627] ? __pfx_v9fs_mount+0x10/0x10 [ 1745.395984] ? cap_capable+0x1be/0x220 [ 1745.396332] ? __pfx_v9fs_mount+0x10/0x10 [ 1745.396689] legacy_get_tree+0x109/0x220 [ 1745.397046] vfs_get_tree+0x92/0x360 [ 1745.397375] path_mount+0x133c/0x1e50 [ 1745.397716] ? kasan_quarantine_put+0x81/0x1d0 [ 1745.398110] ? __pfx_path_mount+0x10/0x10 [ 1745.398473] ? putname+0x102/0x140 [ 1745.398781] ? kmem_cache_free+0xff/0x4a0 [ 1745.399135] ? putname+0x102/0x140 [ 1745.399449] __x64_sys_mount+0x286/0x310 [ 1745.399788] ? __pfx___x64_sys_mount+0x10/0x10 [ 1745.400169] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1745.400606] do_syscall_64+0x3f/0x90 [ 1745.400930] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1745.401366] RIP: 0033:0x7f378de9bb19 [ 1745.401680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1745.403138] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1745.403762] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1745.404334] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1745.404908] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1745.405471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1745.406038] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1745.406624] 09:11:23 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1b0be, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1745.428550] 9p: Unknown access argument À: -22 [ 1745.460534] loop5: detected capacity change from 0 to 256 09:11:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x6c, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:11:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 94) 09:11:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r2, &(0x7f0000009780)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @remote, 0x3}, 0x1c, &(0x7f0000002540)=[{&(0x7f0000000200)="35b122738b395e4fe9d36574ef04369d2d9c2aee8cf4570a5f2679d91ca3865ee64ebdff41dab1572b7d87fc2cc095ad95fdd8cda7c436e3394c5cbb802d904b4ba0ae39", 0x44}, {&(0x7f0000000280)="6ba0b2e1059cbe3dd149a6face885ccfb7c3bae0f9763000b96bef035996e7b6904179271fdb156d5fb52ec63acccae38afcdfcf9d312ed932c0cfe9435380504848376184f270eff8b93464617ec72f59f61f4083272ac0a59b2500f0f886f245c12ae20bcb3805adf296eaa9", 0x6d}, {&(0x7f0000000440)="d95e005199a34b2af11a6f08763c3cb6fc82e9908ec86b4bbfb301cd22dbe5b84a5a931e1ec1841fefefcba03ca2476a3848f474db18c72b585852fd2a0e38ac701c7f567c81f676acce5ac6633d3c94637c2525271ec15d4fb75f9d25485f875a9f12e8a75c6416260e90d8c2b8115d2f21f2f1c61e6c24de50d5a79d135f424754c40f6c5a5560cce538c3489e67a8b65737d8c49e8a50e9f66f5de3f142b370f05b3641ba329c87e867aca8385167f01ac194191e5a1c9806ff239df8286d4695916d5f09", 0xc6}, {&(0x7f0000000180)="0c85eed16fd5f3ce8d5a120984", 0xd}, {&(0x7f0000000300)="a272450cf20c43c96ba02ca2e0091a4eefa8c2fa9b8c847e7c784bddda3df06df17427df6283bf1767a1dc669d158d384166", 0x32}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="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", 0x1000}], 0x7, &(0x7f00000025c0)=[@pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @private=0xa010100}}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @dstopts={{0x1128, 0x29, 0x37, {0x3c, 0x221, '\x00', [@jumbo={0xc2, 0x4, 0x2}, @jumbo={0xc2, 0x4, 0x4}, @jumbo={0xc2, 0x4, 0x2}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @generic={0x34, 0xad, "e9505b29bf6e1418f5c867be8b39d78622db1977ba341b55b32c670fda61058de8059e020a3c1d4cea5ca2e6d6bd29057fef3fdf990551523cf05d6dd9b08b657270695edd23cca1edc50c6c5ad32f734bac79414049f11ca1dd3153842096b5969b0ae582b9bad2ffd823a75556868ad450d5d6fec103da9865c3443fc9ee3efa59c85452d0e033a5d00d64e852ecd9e4601f8164e04b2a241da59141887ddac35dbad6686d146b8803dbcb9d"}, @generic={0xff, 0x1000, "f4baae95ea9612162a457abdfdeec401f5891ed36c680d3af45889d8f4b99b1ae8cbc52bdcfaaf2d93a03cf2956d628776440eb86e26be34212cc506558d927fdd7e62fd544244bf40a09d7bae640658e7f0b246bf5ce3492a0e03e3c91cc12035d9e6ab540801b634b421fbef76167365ecb4c39ba2955ce6c0eb0c300cb8b4a3f70a3a2c72c48c2ac46c56b3df0b63983e0cfa9c791936dbf0b974994cd0f8094ed3113cfd65251c75f8bda98a15a5ca7d53250595343c0a5c5e07103e941f4c4332efe72bff5a4463759d18e55cfeb591eb1046bacd3955f7eaf34aca45dc6a8dbe25b4f3711fb8fdc35cdc685c808d08065e7eee6d06795be550de17bcfee687d8a0a67bbbab18c62ff5743e843b9785467e9cd1230fda5278d8b8a3670a86f773451d6c696ddb2d83ddf4e21ea7e9fa8f16d606676e0d6b3a17f03c7d2b79ae1d056477922ba48c4f92988a1adf6e49c05ba1275308f0d3dcdd764d70c1a4a3a7dcd350c8270f57e8f9c16761f95c3b2ae8a6fbf6ef1b6ff04fc551eef043a3e6a042140e0eb47cd747b4a94083f11463d78cf540c6c129ac28d52d5d658c5aab9d5a8e76ebbc89d909d0c20b3f0d21449b78fa889efca398d3d6204449c01f30808d156f9642974464a51248d03d982d8f92ce02bd8449e365dcf87f625008cddb6eb4947ec4ba6a5a5da8a868a90c7a8332214d444e2b4870d51ea8a671aaaae390d1728d9d2ff1815bc39975b9b886b1c34dd01131a39b7fcb4a3c463f711eab42e011edfe184dd2a10cf538ebba9c44538155bc59b511e4fc7647fff3131eadbb6748f0ece82e97d1c7a5eb3fe43621e12f14bb17463c563f76f60f9a1ddeaaf1b33e7e4e6b90d9cc3b4e654bc3771345e18bbd809830ddb25c8149c4216707e356298a90586186bc28d96535515c55c70148303b79832dd447281e015311b719d1b480665fa55b8cdc8544553ea06af93ed7a0f9bf6ca22691e34119f4cd98a47ab0bd531e9e874aed93aa3675e3cb22237155562da475705ec6ebc847d25a01565a2d81f0a09645e75c18a15c036a5588ea706e7d2f03a72ea1b1b77c1db68197466aba46e9f2faebc37223c5d0b079c40d7deafb3702bff0e3e5b8eba86ddcc3a81574a740b4642748f2d72a826466101966e5e90c979ce6e960c5aadf5137c4a10db91d11ed4c59f7d508fa719d9b286dc14bd1390daf8ec58c721885dd9c9cda2d81463bb094c4b28d94e09c7b7c15c318d1c643497d3446d55dbe099480ae4e67ea037624c0d1046b4454373d0d4bc436f5cb6f52c33a5353145256c1cc592decbd8a0c1bb7ef269767c1afb3df6dd9a553433c1ba8fd9d2ae8fc1a74bbc166e7f7e2b92e09878b3f7c44dd73949a69cc2d446d64d939ded64d1d1625df313126d12e74591fb1e2b8002b1f5f4f421d1b562e1876c3a24ce8724cfa5ef9cb73a6f94887ffc5b26dafd3fb1896b10a35430d521ac0123f34849154455dc5e85b4f142f60dd1508c1217ee67b3a3bdf802c5f570c1dade48a98faa506f019fb8ede214f436940444e926c3f2d11738508f039028ee70bf4ff6980b3de016e0eb60af13d5294d148047e44f8c9482a6dad0cd01dc606fbd10af1ffb28cde5c8d02c2311f98e456736c318ffa025c16d56ba81cfbe8739b08d1f77e6302f3a4553bb01e24634119692693384a7337f0e1144432fae14b91aefec0b4466ca1661deb2710e41d0857f763e8ee60105f55467ee68027bf6c8b8bd14f61e44bc0c9be25fa248fca2a8cb39f1328aa72dd2728626da0545b49a148d0e30c12e3383004c2837afc89a55249e7a12713b6f39cd16b6c6666eaad90a9f386a4a094bc1062c78861acda65ada6e96bfa74206881373db27db9a5d03bdcf48a6951407c91960c021cffee510409fc2bf5fe105b78036bfc5b5052ea97e2f6060f89f6afa8b9efc33722f489d2cf66232e506357c67c8ba00528401285b52ebc6aed66a50bd28222b311d12b2e43c3e11c8117f2ee75f4e7ab3db735ca40d331db6f4c3920b8e224c62ee934cc92ddd9f1f0009e1b11178782573212cfdff598abbd2710d3cb0f968b6eaa7610433b93a151c1e8b62a36bdee542e9a3c9dccc0a7f7f5900ea4ad68eaf74c7f3d8ff716a49921590b8ef41bc594e18e65e006b3657e6b3f3754141ff8ac6f1338c8df37a5bbc5c2a509a916c7b71831a2f074d09e418771b402b8624f2094f4351be970cb811428577a2ff5cdcf10b49e8b7d3788119a009ab25e0fe0f113c4821e94f4b588b090bfaeb263303475b1f451f26e78ef5c0927ebaa6444e350189d0591ca01281fa8b9defcfc1652e307c80754f87774ae283f22cca0d06505551a47d6aca3e528a2858bfee17ac02e7e0fb8dcbe87227230ed7d541637efa7f77a19d33f710980bfbe29a91c265415f528ccfb5e8ccff16facd21b08c4d5ec035ad35d3a917405527d81d8e0b35175a6471a353b462d2f1d76b9ec67dc8738850da9ce5cbbaa530b65794cca64d26ae7870e877579a68cc5ae473f133f29d5fbf78b733ffed9b65c214b984719d9f801c13789947d115c2be09131bafbe4c06f2805d96230aea1ddb832e9398a0e8c1f80076b4a541741dee67d74538498fa9c673d9ea5e1faeec128fc1ffe643c3bb40c5302a00699c0e09482322d5fb9dac8fbdbf319812fe2f9db925811ca2f91e0c1908c356a95e4300b81665ea8f1b790adb1724e6d98dd2f607dd4495a753641310fd13ffde362b939918e1be1681133880be4d2bd977eeb335879b0678ada3fda711fe2c968b82978aeede03e1bdde8c48fef2aaef027b8eb3872213105e772b88890c827f81a1125ffa38cf1857da3ea0bfc51bd5d1f1e936ba198a593bc02c5e1daaacb07e474c3489e12f84d07377a65e878667a44a8d7c6cec26a713ba5daed241ffc26e9892730e224b5c44f0844fdca2ae53ffa1356164e1f0e297efd0cf5c6815a263eaf81669bd430d68ec9ae771d10e475704d6cdb983ae765265f7d6ef004244c3a26153c1c17aad34f747cec8aa85ccb5b66ea3e99f9e477ea7cb970ac915b09a197fb94f5a7315e24c6fcab0157b77ebe3caa3a76342db9a5551c2be9fa5f079877e2be8cb53b6d3ab95fc60487c8ae742167ebf4be50571a05857b7a5dc119a1a6d6debdbe93b7a377446b3b210ae910720775aa03332122a6ef1887679e5c1966dab8d84387375a02b98f3534ae4f9ba09d24e11d4c20048c5cc6ca83742f8e0d9be781d8874c8b371c98204cb44cc6a39d6c64c5670d422f0375c3754857e9f17af2cf9397577595793828b5940278660b001095762a6a972279381057155d70cc437d2ba747af8ca6db51812bae31a429cd30ffa79bbe15d836ed97b6713b1e94aceed763bd601eeaf0aeefdedaa95b72ae8336f1a3d410ab058008b9b9f73bf81cf994dda4e7138193d3dc40fce759cae5cd7fb6bd7ea5cd68f5556ef85da4b91f8dfacc27550d93bbd0caf54ec9c07402bcf0f17622460c62670a20888f08a4991954782a2015e17995fc8ca4127c382fef87ee24986508d0a1a5b6ef1a1cf36ed353f5eab2cf576267f5ff7b8c79e3ae0132b9bd788c128acf33171009d4312b3fc2855e548d984198871bf31ac2661598e863618b65a83b7beab46d753f518b4da3e044f607bff29f71656f10d529ed1400987fc92e1e09004faeaf149d66ae8c021af3ce55a31ecbf56e7733f1db6edb22bf644a746d80861c881022f5ecc8e0284daed2387ac1af5311fb1912e4636e59499f623b0c0e10ab15c864d18b54d339fa40ab190d76306648b3cc4e52473b08be5ca1f40848142d027eac68bf65b9fe5644872d1deb78dacbde46c980515a7560f287d27c84c0f5172f74dffd901967c440ea9e33970ac3d67cef7a463d93fdcc63a6d9868d0bf0062d3b0e102ed720e612eb941009275924742cc55669a2010d9b40cefb405dc6fc98f26e3870643da0f377d853161297e18b3271c026ea8f199f63da08129e5aa1bc99f1a023d32b9f06d9cfd1e35c86d4c5df7db4fc8e81c502ebe520475a3ece7ed6ea8d02319b37f38282bd533dae9f494fb1c247ccd9231f7f2a1b6da23f24fc84ced95d47626f4a9b660d8ecd3a684fb3c062518d473690ded5ae3e36f7abfaed9405b4f606b0be34db7334c4a4ae8d2f6fd19cea496465d8ce934587877ba5249991cf72e34f6de948cf5ac940db3423d636f0656199145a5f630a822f4b06fdda766e29be32c11171c32b739ed0c08be68e81c60b0b995195a4b3a0c47cceb8e89640d171a2b376286c596a4beded8705f4deae8ddd65b8b9fc065e96528119e6e4e4646e2962a8d389cb0b5215c6596670f46055b3c23a843aba2132207194d60bd97b62ba39b545539e0e2bfeb439d2208fabc150376be1a073891376eee1d2ec8850846b77d24348873c5ab95bf8ba998f35ea59b080950d8c8655bfa91d80dd010a523777ac186cb4f5be333fbeeae47146aac4fbb043a2887981a7de8e044bb0f46e8c2c979dc84eb09b67bcd0178219b48f8679ec53e573847353c22b961e5e9e053c33ba7bed5f3bf5feae9600076cf232479ae257c955775250fe2a0f9e1618b20f6b4dd421125e942a6418e23de5c7735d95fc1d80d3d688673491163b61bbc14cb7b25f0cd419e877491c0a2fd14890cd44a87f7081866dca9a55466baedc04d26492d5a474e02974984b99383f59c461b035255749c1238289a556f78a5c24969e616d1b447ef8ae0febdb149ed747c561133bd25e8f15583ac34900f8af92d43bcc7ceac8ccae88a2b3373c8e895d1fac46cd84a54e38f2acca302afdccd5ddd088d3ab1f2368e1f21adea7c79124f29b51b52a0a0f977acc305e0eb79ce5b19ecb8227ff0f4d46865b4201da31ba717712b8e4238c7f1a3ea65d19b3b4ec8209fcaaa6232224bca274edddeb37c124bc5dd6e9909e60f2827d6f5d4fcf627ce300efe5968fe0a203be8c612b5d4e43ed41fb13570a0a8e18f91d9634eb783292716f514578841596a463b225aa1f26248546a5935c948d9ce3aedaa2b597feb78c77da3ac162a1ed708b36d00f75192cc4f6e027a32b307273c10861fd8c867222f950cbe891e30d7033d7bd9567bde7340621bb09fbc666f7811be50f79fb3c8980943ca97c02df3fb728ae868df78cf4c882495e1e30a288981ba0fdb3c0c780d0998ff863ff4b133a248a537f981755c38ecc5243d976c925b7222a4b5ea7e0a45339350e4cb49e51eeba79ed1d1d7f6bf6b112853b285947cb515e9d3244ba5a3f207d46da12f840ec4f9d0e9c039e0a362d79e2cdda2351efe83d6e39d0d4ca8bdf4ed19fb06d61e0a3f9945d2d27a3785f1737be30080a3c569aea7ada8b0a49c3f372c65f2f7b374ac372f21fe557e3d5b8cb47412cc3c1512ae752e0a073a5e0885a43239ceb1bcdd4fc32e00e55cd518d1260cbfd0fa24f831ee16601e6083fbbce904854b0a6d0d55a22838fa3cd27534fc67524ac95937ee11f704640db3aa48044e37127536376ddbea3bbfa021baa73175726ab6604b358f28a62993d6273d3b77b3cc0d775645e63f6edd81a5bb27aeda4a20bc581afe91efa8570080cc40053c451ddc38e6aefac71e3b303e24e8e4810fe9e499e4c4e28ea996a33c35f9b27ee5f95d654af7d4978113e008e596ff2a442223eb8257ade24d6492a5a955bd5e7b8ca19800c2f0a8a85ffd49a77c99ed00f7c197d89ab3229b04ea287ac5ebd1a730ae46e100b618c92702dd6420d"}, @generic={0x7, 0x37, "467beec98c7b06f9756ebb2f0aaef8134fa4b0b78a0344407addc093f93aeb2f51df33d0f4eb5d312f161f585e3b009dc70c2262143d12"}]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x3b, 0x1, '\x00', [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x1d, 0x3, '\x00', [@ra={0x5, 0x2, 0x2}, @enc_lim={0x4, 0x1, 0x6}, @hao={0xc9, 0x10, @local}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @rthdr={{0xa8, 0x29, 0x39, {0x8, 0x12, 0x0, 0x0, 0x0, [@remote, @loopback, @rand_addr=' \x01\x00', @mcast1, @local, @mcast2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast2}]}}}], 0x12a8}}, {{&(0x7f0000000340)={0xa, 0x4e24, 0x5, @mcast2, 0x7}, 0x1c, &(0x7f0000003900)=[{&(0x7f0000003880)="2b36f278f0ac5f506e88c8264dcf2b44db1db31cb392e18f3db0867b35d4076f45c949abcef8f159bb06df67ad9138bd9233e865167c9e6fd19e0d70ed43cc6ad7ea2fd9380aa8c37d3c21fe36926aa7c8b295a6ffb50ce88617623e5c430b424f1ce7d290", 0x65}], 0x1, &(0x7f0000003940)}}, {{&(0x7f0000003980)={0xa, 0x4e23, 0x80, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, 0x1c, &(0x7f0000003f40)=[{&(0x7f00000039c0)="33808d7f06d648530394f05f1f2995b4d5ea18a1982dacd7308410a916059e36a8043a26d2ead6b6a110f2aa132e9a28fc280586a6185ccc5c921255b913ad189d052d55a2a1e8e7c2d6de175e9785ac00945b33859d88817baf1eeb9adae414f82f236e602abc65f653b30cac096e0d473c08dd1892dbe0d0924c6fd87298d03ab0c708e731f4939a2076a894332e2a00281ece3db7f07f2665990b79", 0x9d}, {&(0x7f0000003a80)="9a336b6532a164068173defe5d11a4e85c7b56b717a4f071db7df133227cd0fe573379dcba9e33bb8798f0d37bdb6b9c83e19391611cc9695f5134d7e6ac39930bc055bb615be760ea1a0fc161cbeb62bd47d9f82063235b4f4fbeaf085c269fff1c71d7a5774fdce01ab4b03ac73bf126deb2b72f5579cfff61520ad3290e03c5e04ca534085a82193e357d665f348a6dee7f29f05e65ddb0167eaeda1ddd923b4bccb63d301ba10cd66fd3e8b34d9948efe56025968d4519f1ecfd6fbdd3864ac7a17d9699db9bcbc696a85285c0775cff1cb761411302105f391ee583dbaec0ed42ad94046513b002af7401233ba1cb", 0xf1}, {&(0x7f0000003b80)="237d66b811e681ff8bf1afa3a4cdacd64f7f", 0x12}, {&(0x7f0000003bc0)="c9abc348be9433f38504f25570", 0xd}, {&(0x7f0000003c00)="17fc3cd6d7daffd2c94da8b8bdd1017a67e43c798f40a307bc5fb0ce328edf1ad806799ba2283bc8c7bcb0447dcf5b4bee8ee55e62e10d9b7b061f040c29e05243d616a0c9797d9b7bd90de0857a9ff9be215dbc78496a6c69f35c077eb05a84a498f1d138fdce5ccda7654cd5552fdce8e8696d1185520f0730688c0799059f365dde2b0ff8018440389922f0185ac6776610bbf910cafa886b44317f9a6db7ec02baf65c508119d66eec376dea90d909510b270472a870636939ab42710c20db6facaef1bb687b9626eea238f8b413030a4d4d7facd8d6c573e9c5f1d1c2a5c3576888af3cd9a6f803e6b30b65298eeffde0", 0xf3}, {&(0x7f0000003d00)="af38ff013273d800f3812cb5459e2dd28c6316f3651c12d63bbaa624a84645e4223bdba7663b939ea293c7d6bdaf125f7a54cfc547e1c2c6280091809baccacc2964e696fa6734fcf6c1e4fa0856bc537c4006e139c16913aa543141332745b1d5f8f233f1b1d1f7561debf243d98d77a19ee545adfa3a3a38f2757714cc3dd580afef5e0881153fb58011bfce15a6a5911264c291c374688420aff7bfaa", 0x9e}, {&(0x7f0000003dc0)="485e3958fc464b68aa85276e6ce2980fe66b5f11bc805b7a886b9c3d81314e7760cc8d9d41b03de9f22b14253436083789bd089d4206c58a4a5659d50ce37b2857fbc0164d0815a9cb92b1e56a2b12e823a37cb01ae192dd981496401cd54884c88b59287d41517e1b7aed6d9e6a98e977d97d97cc4e73cbb918d508cb5ea42f8c7fce54a72f14e69bf4c5092c22f4a40f7e883b6aa1a74ea4433cd8e1eab32a2898e1e9c4477ad70e82910c8d5c6d71f710bde579df", 0xb6}, {&(0x7f0000003e80)="6ca842c6eaef460145f836aa06d007c2506d180b0244849f469bebae83d271bd01286cd31a317e5efd9514e088195510f9ee13b6f5799d486ca0a28651708ba40ff61d30f7b4400c1983c79eed55bac7f6c5988823950d31226b1ade77e64526cbe2e3e6b64d0479d9c7668f6ddae01e205c6e767fffaa440731d97397df19d1da948136ba88173fb92695a5db0b65c1a83484e504e400699095e2076562dc2131a26dde7bf50d708fe8ad30b44e49ca9bcf8c9d6c56615a3677909567d12a87", 0xc0}], 0x8, &(0x7f00000058c0)=ANY=[@ANYBLOB="1400000000063400290000003e001dc7719023af6878c38350e34bd7c0ae84475e9d43000013b579"], 0x18}}, {{&(0x7f0000004000)={0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffff9}, 0x1c, &(0x7f0000004580)=[{&(0x7f0000004040)="6a83684e2c3b634c11fcacc4871dc45a232c7f95f52a7109c60c62281e2c0ca670f94330bd7ad3883675b2466f9977535df4aa154980418baee6f9b45df024805f46acd67f4d26663894bed77e3294854d234476d7a7b11ae790959bde831fdd84df6608d78347316f9e184dd98373f546ee524430b297a9eb092aeddd3af88eff64131debd5cd0330190fbc705d57ebeabe87c1a0caa5cd55963429ab4bffaf9aa310b2eeb34c602a90a9aa28dc4c9b7b014ae90a0d5f2c14b968de9c57bb2c5ea3e9922853cd0d6148", 0xca}, {&(0x7f0000004140)="768bdc78cfa0a42e8b2fd7b567d850beece4b62de7d4b940d251c4569b92ba4b7a499cc6547e552ea0c8a5ea00ffd16675af1e1b86c9bc79a249afba9b8bac3d9cc11e6ee733822fbf19fc61a83dc8", 0x4f}, {&(0x7f00000041c0)="8ce67d54fcd646a88c83b4790193b615837fed90107f31468da00b7e7ea413c803d32b4952445e67dd7f73f026d6529434ffe8821777269bcba9746d9fc2325dbd1d2f0d09be517ec09c789d22f84cf416ee41c4e0e7de8e079e17e0de38c9ca743a3f24fc4a01b95afa592236ef22bf98d49a50c2a0be478b045986e2d6a2dcb5e97fd3684aba1fb5c744aaeb1f25e9481c3a4697035f3ef07021addaa1dc1c58", 0xa1}, {&(0x7f0000004280)="e8d65fc82723d951f0013164ec4fc9bdc7090e98f4d8442c86c59c7b04b640363012096c4ef711d54ecfbe9728bd5ec1475120ec239fea1dc975d3918855ecea23313a05894d1e85e4d64b7519aeb068d022dc7e6ae15d086a2833a931ad569563377e08e4973035db35ef31fcc35d0dea64a87130f909c8eb13a6bf616392166b4ddac5edb6658f77056b338fb6419cd6f228865184c0857affd11cffb76736af53da73adc75638f4bd868d81e99dc502342f5b45ccffa1bb4f04f2650f3172825abb66c47d515e50", 0xc9}, {&(0x7f0000004380)="2769e5546d7c8c8c6740f30e802613a21ede8070cf0fc6247f1fc330", 0x1c}, {&(0x7f00000043c0)="272ad92df6aa10fbd406465de0886e3e026d2783421e1a4b91ae8e886f875e14d163460743fa9a6e09b4314ec72f2bfabf635162e6a89dd611c90ee8009ce41d8865c33e02d7fab8d7c2e52c3b8199cf6e31cccd11affa9d8117b4489545a5c16f0c8aa0d6f43091671942", 0x6b}, {&(0x7f0000004440)="3b9178d3bc98429124efe9e0b3826c58e0b31022014efbc4ef6655bd4b6f81f3c719", 0x22}, {&(0x7f0000004480)="98174ebdb56cc7cc8bc413655c4285b6e2e8450b167fb0eeb636f6ecb48a4f157ffe15783bd841ed0f6dc316c0ef8ae7ebea666e6dd6d555051ed1c45f1373fe3e9a9b49dcbcdef94600347164887153a042f1b3a04806d0fbcf036441b3ef52b33799cce4690cda3119e4d2bb47a2066197e8f6aa91cef48c63f23873284559e637b5fc8ebb717fe37fd8d56355f0afec632afca9532fc66f67a75028890ca36b038efb54c8030d5384b652ea9393fda1248766e462162294cbd73ec0d271e596a74c921a6d9f0690175aa682178a6c1265150f398ef13962233622c11a240b5388ac54", 0xe4}], 0x8}}, {{&(0x7f0000004600)={0xa, 0x4e22, 0x0, @private2, 0x910}, 0x1c, &(0x7f00000057c0)=[{&(0x7f0000004640)="b54dcf21bd51b15e4264bea5e0686faad90bb2e95439e7f7e49871a005197f10a0ccce739a0c4262ce39007e5020f2f7a6ba9ef57995f7bff29de17c4e22e476516e068ae053c1f65bd6d10c29fe43bb0db5e8c23213db30c6ec04", 0x5b}, {&(0x7f00000046c0)="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", 0x1000}, {&(0x7f00000056c0)="70259498ca54af19855a2239f00e412506758c6f6e64f25b4c964953806667186ae0e88ba1b4756bed26e32b41b380cb8ae67ab8c01e3e05e8acd209e8cad8faf3aabf214fc9c1f389b493623b9cc934760d1bd2654871992f682735625514b55ddd17d99b92f6c4d48ad1c988f7c738df975b3c64e1e0456e6c4110e0982c703b0b343b82b582d81eb206057709e049941f8ff4c17c7a5a3092b20ad162db4648c8fc39f18aa376aeecc83acf3a2d1660e8582af188dfaac8b323fba410f6f8dd00db8af5a6b8bdae4a4a40363d", 0xce}], 0x3, &(0x7f0000005800)=[@dstopts_2292={{0x58, 0x29, 0x4, {0xb4, 0x7, '\x00', [@ra, @enc_lim={0x4, 0x1, 0x1}, @pad1, @jumbo={0xc2, 0x4, 0x3}, @pad1, @jumbo={0xc2, 0x4, 0x8001}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x18, {0x2, 0x4, 0x4, 0x8, [0xcf38, 0xf6db]}}]}}}], 0x58}}, {{&(0x7f0000005880)={0xa, 0x4e21, 0x9, @private1, 0x8}, 0x1c, &(0x7f0000006d00)=[{&(0x7f00000058c0)}, {&(0x7f0000005900)="46031aeeed24289d1a0caa7e8b58b6702d007697ca5a8a31a1d721d9be0e35f6c9866d19a03e58dfd44755121791a8f8e97eaf44e87772f304d43462e8ff25557a0932bd476920b185abe09e9652fdc0bce0935b0cfba4d67f9deda0de92c3eedddfaa1569f24a0304f905dd8b487270b2ead0825c3281f514baca12b4ade53279384aeafdea71205c291db82208e16d", 0x90}, {&(0x7f00000059c0)="747315a9e91ea6bfddee0982628100398b719f8f45f8548b76a03250246a0385494ba5e70afbd7037f2a3e25e39ebb75c8bb241d1f033c7519ba25173b0be51a5e14e4551493b149a073b19685a66383c7cfe5a8e2baa64514c8b229abc4", 0x5e}, {&(0x7f0000005a40)="9fdda66a479e370fd87442ba0d85fa36886e3078e8ecf16bd4b351f5880e2492b02ff299c2afa475d23a723bca4f3966a6", 0x31}, {&(0x7f0000005a80)="a62d468f3db06a818d13d9ed7f0757c3bfbcd3f7c68dfd951fcda9f0f76842fdda7f8cf48127040d014d121a871f63145b45cd2f67584687755042cff8d62f1ae39b6f53e9502bf35705140c6a7ea8a8e11cd3a06f820c46fb83b45879246b618c70f62ff494f3539fbb482a82295aac2c90649f6ea4e0ff20fc28d57e545f3e08ae9a81596963b2f5340b0bee4de6d80d", 0x91}, {&(0x7f0000005b40)="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", 0x1000}, {&(0x7f0000006b40)="c915ba9797c6ad2c85ad417d2f903e87127aaaffdbe2cd4194d4c65066aad094099d25f78b0e2bf6799dcb9164504e919016ac0a81b5629128f3bc53f4ba583d4008be4c1e0d52bf6a38bdc314a7c5b5bad0acf2fc9fc92f2dda798e08ea4487ba8054a1f1de7f37a77ffce246a699c0950bcec0600337c045e2f9b8fe1c1c5f33f4c9121e416c28f5475671bee8c6defb36e11631c065c25eb648d65e3c3be1dd50d629d9ce760ee9eb7f34088e790e80421f2a9332b4b945b288049fe9c6e07544869374495ce965433a2431", 0xcd}, {&(0x7f0000006c40)="65dda50ce1806918afea62445e24e99e2ee6eced3d869dee7259dbacdef645734d1780a7b9525262c619de9bc55e8999e2c685096ca52e588eca9d2932fcd664b9c27920fbd5f07d62ca804705792312b8ae3fd44d8bdb12bf3fdae1fc3fb0118892fa899ed6a6e8fcd0fd143aae", 0x6e}, {&(0x7f0000006cc0)="601494f6cbe276aebbc3f4bfeb95f01160f1b5a49e13be8adeab40", 0x1b}], 0x9, &(0x7f0000006dc0)=[@flowinfo={{0x14, 0x29, 0xb, 0x59f8cf1e}}, @rthdr={{0x48, 0x29, 0x39, {0x4, 0x6, 0x1, 0xfc, 0x0, [@remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}]}}}, @rthdrdstopts={{0x28, 0x29, 0x37, {0x33, 0x1, '\x00', [@ra={0x5, 0x2, 0x7}, @pad1, @enc_lim={0x4, 0x1, 0x5}]}}}], 0x88}}, {{&(0x7f0000006e80)={0xa, 0x4e24, 0x1ff, @mcast1, 0x80000001}, 0x1c, &(0x7f0000006f40)=[{&(0x7f0000006ec0)="50dbd218ecdfd3a13e57cb9e5090536dd1a7e24cab7e7f4a928203a324cfc76f3c9dfbc7199c3ea6e41bafa4238f4a5f305fb822d2eb709b138a6960b012159840f9326a00", 0x45}], 0x1, &(0x7f0000009a00)=[@hopopts={{0x60, 0x29, 0x36, {0x6, 0x8, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0x7}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim, @hao={0xc9, 0x10, @local}, @jumbo]}}}, @tclass={{0x14, 0x29, 0x43, 0x1}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x61}}], 0x90}}, {{&(0x7f0000007000)={0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7ff}, 0x1c, &(0x7f0000007140)=[{&(0x7f0000007040)="eade03b85e06cbf7887c52ca996ccb5bdad14b6196a938f2ee95cc140be4f5d47bc2b8809c103386879b7be07d456162fb020d28a75338e52f6d10137197f2651849b43238b20c855c468b2b079a9547ffc016aa28ea02767b8dabcb061a5740b9a2b6d0a6f05ab960c1f9c7bf098d1a969a560f84a0c6abbd46d6017a2a3f08d9ef344c13c86b51760c0b79869bc34265ca13897ab62ba9b3c408e72e7eb813fc3703fb798f7c0df47e1b317935df6567469be16bb3bb3d1e9c1569", 0xbc}, {&(0x7f0000007100)="45991c31e0fe8f72c18d84b41f345f6c891e247165b7736ce06bafe65bacbd3079", 0x21}], 0x2}}, {{&(0x7f0000007180)={0xa, 0x4e21, 0x7f, @private1, 0x6}, 0x1c, &(0x7f0000009240)=[{&(0x7f00000071c0)="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", 0x1000}, {&(0x7f00000081c0)}, {&(0x7f0000008200)="3508720bc7f3030b9aa829b653c2564362160895ed7b6d7f063d40200d", 0x1d}, {&(0x7f0000008240)="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", 0x1000}], 0x4, &(0x7f0000009280)=[@rthdrdstopts={{0xe0, 0x29, 0x37, {0x2c, 0x18, '\x00', [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast1}, @generic={0x8, 0x96, "19ff4f6f9f169a10e65cd510bc814e6da4a4c54071641f0b0f64870bd48460b1427263d4acfcd583339ee62f44bb908d917e9876616c9d0726c7064357d3d70876c048544371daa1d54f8a66dd428c8ddcd5b0fa93f022c06104fb09cb5a6065faf78d21481799fabe0528b8e4b1949b741e36f41a30af92dd9319fec018821f8c45aa54e3cdd885388bb0bde3e0725c971f771fa489"}, @hao={0xc9, 0x10, @local}]}}}], 0xe0}}, {{&(0x7f0000009380)={0xa, 0x4e20, 0x3, @empty, 0x7}, 0x1c, &(0x7f0000009480)=[{&(0x7f00000093c0)="9eed4ffbe1b3f67d68d0534d7f72e0381d1f36e6c97423734bb14eaa4882ce5015805aa695063cd56384997d6ded3c2d85b2ed67e2ed714f225a380b69d7835c08631819c98be2df5d7415f2e8451404ec19dffbebf3c9aab6209e0fcf16b58a54da51467bf0907cc2f37758c8d2069f548499299a626a7e02a61d6cb43c6676d9e0d48787c2aca3b9047f6e", 0x8c}], 0x1, &(0x7f00000094c0)=[@hopopts={{0x48, 0x29, 0x36, {0x3c, 0x5, '\x00', [@jumbo={0xc2, 0x4, 0xfa}, @hao={0xc9, 0x10, @mcast2}, @ra={0x5, 0x2, 0x133e}, @enc_lim={0x4, 0x1, 0xfb}, @generic={0xff, 0xb, "5878bf1e8687743533f527"}, @enc_lim={0x4, 0x1, 0x9}]}}}, @dstopts_2292={{0xe8, 0x29, 0x4, {0x33, 0x19, '\x00', [@enc_lim={0x4, 0x1, 0x2}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x81, 0xb9, "a4c0b497af1728423baff9e8746ca4841fc426942c3a7cbd1688dffbe45d6a8b68a1762a40f3f828c416d043430c9971445a8f400d137012e97a6b7e249f611db5bc5baaf3aeca50d06e7565344e3369e4e3d61d3ffe5f33332d55e5134382666c0a02923f51fbc10b34659ca423b7b296064c392a15c027525c1bf951a218c62ca1dae43a9b6779cd16aba2ff8f5eef1a6797cb3cf4ae05594458bd3473dfd79f366a5a6ad02a198ceeb37c93dd775bd6eee93e363ed99c74"}, @ra={0x5, 0x2, 0x9}]}}}, @tclass={{0x14, 0x29, 0x43, 0x9}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfff}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x5c, 0x6, 0x2, 0xff, 0x0, [@dev={0xfe, 0x80, '\x00', 0x15}, @empty, @mcast2]}}}, @dstopts={{0x20, 0x29, 0x37, {0x33, 0x0, '\x00', [@pad1]}}}, @rthdr={{0xb8, 0x29, 0x39, {0x2b, 0x14, 0x1, 0x7f, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @empty, @local, @private0, @remote, @ipv4={'\x00', '\xff\xff', @remote}, @dev={0xfe, 0x80, '\x00', 0x12}, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}], 0x280}}], 0xa, 0x4040) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="723e6e733d66642c72666403000000", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="c12c616363653fc4dada73733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) r3 = inotify_init() ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000003940)={0x3ff, 0x0, 0xedc0}) 09:11:35 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:11:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x18000000}, {0x0, 0x0, 0x10000}]) 09:11:35 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 59) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:11:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6c00, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:11:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x398d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1758.095645] loop5: detected capacity change from 0 to 256 [ 1758.135880] FAULT_INJECTION: forcing a failure. [ 1758.135880] name failslab, interval 1, probability 0, space 0, times 0 [ 1758.136789] CPU: 1 PID: 9910 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1758.137365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1758.137967] Call Trace: [ 1758.138158] [ 1758.138316] dump_stack_lvl+0xc1/0xf0 [ 1758.138622] should_fail_ex+0x4b4/0x5b0 [ 1758.138937] ? __kernfs_new_node+0xd4/0x870 [ 1758.139260] should_failslab+0x9/0x20 [ 1758.139545] kmem_cache_alloc+0x5a/0x390 [ 1758.139861] __kernfs_new_node+0xd4/0x870 [ 1758.140174] ? __pfx___kernfs_new_node+0x10/0x10 [ 1758.140517] ? down_write+0x11a/0x1f0 [ 1758.140798] ? up_write+0x196/0x510 [ 1758.141092] kernfs_new_node+0x97/0x120 [ 1758.141412] __kernfs_create_file+0x55/0x350 [ 1758.141734] sysfs_add_file_mode_ns+0x21c/0x440 [ 1758.142061] ? __pfx_slab_attr_store+0x10/0x10 [ 1758.142447] internal_create_group+0x322/0xb90 09:11:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x1c000000}, {0x0, 0x0, 0x10000}]) [ 1758.142811] ? __pfx_internal_create_group+0x10/0x10 [ 1758.143361] ? up_write+0x196/0x510 [ 1758.143646] sysfs_slab_add+0x18e/0x220 [ 1758.143956] __kmem_cache_create+0x1fe/0x610 [ 1758.144274] kmem_cache_create_usercopy+0x218/0x340 [ 1758.144660] p9_client_create+0xd0b/0x1260 [ 1758.144988] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1758.145374] ? __pfx_p9_client_create+0x10/0x10 [ 1758.145731] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1758.146113] ? lockdep_init_map_type+0x21e/0x7e0 [ 1758.146474] ? __kasan_kmalloc+0x7f/0x90 [ 1758.146775] ? __raw_spin_lock_init+0x3a/0x110 [ 1758.147137] v9fs_session_init+0x1e0/0x17b0 [ 1758.147479] ? __pfx_lock_release+0x10/0x10 [ 1758.147803] ? __pfx_v9fs_session_init+0x10/0x10 [ 1758.148165] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1758.148567] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1758.148942] ? v9fs_mount+0x9e/0xbd0 [ 1758.149225] v9fs_mount+0xbd/0xbd0 09:11:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3a8d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1758.149506] ? legacy_init_fs_context+0x44/0xe0 [ 1758.149928] ? __pfx_v9fs_mount+0x10/0x10 [ 1758.150298] ? cap_capable+0x1be/0x220 [ 1758.150628] ? __pfx_v9fs_mount+0x10/0x10 [ 1758.150963] legacy_get_tree+0x109/0x220 [ 1758.151278] vfs_get_tree+0x92/0x360 [ 1758.151566] path_mount+0x133c/0x1e50 [ 1758.151885] ? kasan_quarantine_put+0x81/0x1d0 [ 1758.152239] ? __pfx_path_mount+0x10/0x10 [ 1758.152544] ? putname+0x102/0x140 [ 1758.152803] ? kmem_cache_free+0xff/0x4a0 [ 1758.153132] ? putname+0x102/0x140 [ 1758.153407] __x64_sys_mount+0x286/0x310 [ 1758.153705] ? __pfx___x64_sys_mount+0x10/0x10 [ 1758.154033] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1758.154430] do_syscall_64+0x3f/0x90 [ 1758.154729] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1758.155090] RIP: 0033:0x7f378de9bb19 [ 1758.155358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1758.156655] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1758.157232] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1758.157742] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1758.158279] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1758.158763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1758.159286] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1758.159804] [ 1758.172771] loop6: detected capacity change from 0 to 256 [ 1758.196446] loop7: detected capacity change from 0 to 256 09:11:35 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:11:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0389615e9d88151b2c1497d3280cffdcf4ba87ca7c0a8652d086dd59fda3ea39616048c4b38d0095d13987c1e5196887cc5b2f55714733119c8e9731514e272f197b6537214d2313eb0c4c45ce662df797063591dc4c30719306b688588daa20e9bfbd163fd71132dfef93d4922416924fef2ee6413c4facd82011565f55ed215c7b5030bd62ec2cc1157fee053279788313e863b8cad600ed69662d938be7153a9ed52263b31bc5463fd4a3f9ddfc4635b8bf0f6b8fba1d408dae1380c3ef6cb6f79008f493ae499a41eeb4192db"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1758.210697] FAULT_INJECTION: forcing a failure. [ 1758.210697] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1758.212665] CPU: 0 PID: 9915 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1758.213714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1758.214759] Call Trace: [ 1758.215157] [ 1758.215472] dump_stack_lvl+0xc1/0xf0 [ 1758.216058] should_fail_ex+0x4b4/0x5b0 [ 1758.216655] strncpy_from_user+0x38/0x340 [ 1758.217279] getname_flags.part.0+0x95/0x4f0 [ 1758.217964] getname_flags+0x9e/0xf0 [ 1758.218518] vfs_fstatat+0x77/0xb0 [ 1758.219043] __do_sys_newstat+0x81/0x100 [ 1758.219676] ? __pfx___do_sys_newstat+0x10/0x10 [ 1758.220305] ? perf_trace_preemptirq_template+0x252/0x420 [ 1758.221108] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1758.222060] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1758.222878] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1758.223502] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1758.224233] ? syscall_enter_from_user_mode+0x21/0x50 [ 1758.225018] do_syscall_64+0x3f/0x90 [ 1758.225537] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1758.226323] RIP: 0033:0x7f2fa4221b16 [ 1758.226883] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1758.229225] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1758.230269] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1758.231223] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1758.232150] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1758.233054] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000001 [ 1758.233941] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1758.234846] [ 1758.251591] kmem_cache_create_usercopy(9p-fcall-cache) failed with error -12 [ 1758.252218] CPU: 1 PID: 9910 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1758.252816] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1758.253413] Call Trace: 09:11:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3b8d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1758.253603] [ 1758.253903] dump_stack_lvl+0xc1/0xf0 [ 1758.254232] kmem_cache_create_usercopy+0x12b/0x340 [ 1758.254608] p9_client_create+0xd0b/0x1260 [ 1758.254944] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1758.255345] ? __pfx_p9_client_create+0x10/0x10 [ 1758.255676] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1758.256061] ? lockdep_init_map_type+0x21e/0x7e0 [ 1758.256401] ? __kasan_kmalloc+0x7f/0x90 [ 1758.256720] ? __raw_spin_lock_init+0x3a/0x110 [ 1758.257080] v9fs_session_init+0x1e0/0x17b0 [ 1758.257419] ? __pfx_lock_release+0x10/0x10 [ 1758.257745] ? __pfx_v9fs_session_init+0x10/0x10 [ 1758.258102] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1758.258489] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1758.258865] ? v9fs_mount+0x9e/0xbd0 [ 1758.259160] v9fs_mount+0xbd/0xbd0 [ 1758.259440] ? legacy_init_fs_context+0x44/0xe0 [ 1758.259786] ? __pfx_v9fs_mount+0x10/0x10 [ 1758.260101] ? cap_capable+0x1be/0x220 [ 1758.260421] ? __pfx_v9fs_mount+0x10/0x10 [ 1758.260752] legacy_get_tree+0x109/0x220 [ 1758.261069] vfs_get_tree+0x92/0x360 [ 1758.261371] path_mount+0x133c/0x1e50 [ 1758.261665] ? kasan_quarantine_put+0x81/0x1d0 [ 1758.262013] ? __pfx_path_mount+0x10/0x10 [ 1758.262345] ? putname+0x102/0x140 [ 1758.262625] ? kmem_cache_free+0xff/0x4a0 [ 1758.262936] ? putname+0x102/0x140 [ 1758.263222] __x64_sys_mount+0x286/0x310 [ 1758.263545] ? __pfx___x64_sys_mount+0x10/0x10 [ 1758.263899] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1758.264297] do_syscall_64+0x3f/0x90 [ 1758.264579] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1758.264974] RIP: 0033:0x7f378de9bb19 [ 1758.265267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1758.266595] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1758.267159] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1758.267655] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1758.268172] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1758.268672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1758.269183] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1758.269729] [ 1758.270656] 9p: Unknown access argument À8–éØQ²ÁI}2€ÏýÏK¨|§À¨e-mÕŸÚ>£–ŒK8Ð ]˜|Q–ˆ|ŲõWs1Èésârñ—¶SrÒ1>°ÄÄ\æbßypcYÄÃ0kh…ˆÚ¢›ûÑcýq-þù=I"Ai$þòîdÄúÍ‚eõ^Òǵ Ö.ÂÌWþàS'—ˆ1>†;Œ­`Ö–bÙ8¾qS©íR&;1¼TcýJ?ßÄc[‹ðö¸û¡ÔÚá8 >öËoy: -22 [ 1758.290222] 9p: Unknown access argument À8–éØQ²ÁI}2€ÏýÏK¨|§À¨e-mÕŸÚ>£–ŒK8Ð ]˜|Q–ˆ|ŲõWs1Èésârñ—¶SrÒ1>°ÄÄ\æbßypcYÄÃ0kh…ˆÚ¢›ûÑcýq-þù=I"Ai$þòîdÄúÍ‚eõ^Òǵ Ö.ÂÌWþàS'—ˆ1>†;Œ­`Ö–bÙ8¾qS©íR&;1¼TcýJ?ßÄc[‹ðö¸û¡ÔÚá8 >öËoy: -22 [ 1758.325575] loop6: detected capacity change from 0 to 256 [ 1758.334988] 9p: Unknown access argument À: -22 09:11:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) fallocate(r0, 0x64, 0x3, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6106000000733dc03c9b1e54100806d9852064b95d875c9f7c6eba5b6ead68df700d964df4c4c6f405e288b45ecd6803fd3243c9d8751b6e4557886c9a9a455bea74077fd8df2ce0d7055d166fa8"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:11:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x40000100}, {0x0, 0x0, 0x10000}]) 09:11:49 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x74, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:11:49 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 60) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:11:49 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1fffff, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:11:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3c8d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:11:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 95) 09:11:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7400, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1771.980616] loop7: detected capacity change from 0 to 256 [ 1771.991863] FAULT_INJECTION: forcing a failure. [ 1771.991863] name failslab, interval 1, probability 0, space 0, times 0 [ 1771.993340] CPU: 0 PID: 9945 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1771.993904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1771.994463] Call Trace: [ 1771.994652] [ 1771.994816] dump_stack_lvl+0xc1/0xf0 [ 1771.995102] should_fail_ex+0x4b4/0x5b0 [ 1771.995398] ? getname_flags.part.0+0x50/0x4f0 [ 1771.995730] should_failslab+0x9/0x20 [ 1771.996013] kmem_cache_alloc+0x5a/0x390 [ 1771.996306] getname_flags.part.0+0x50/0x4f0 [ 1771.996627] getname_flags+0x9e/0xf0 [ 1771.996893] vfs_fstatat+0x77/0xb0 [ 1771.997157] __do_sys_newstat+0x81/0x100 [ 1771.997454] ? __pfx___do_sys_newstat+0x10/0x10 [ 1771.997767] ? perf_trace_preemptirq_template+0x252/0x420 [ 1771.998167] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1771.998548] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1771.998941] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1771.999237] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1771.999577] ? syscall_enter_from_user_mode+0x21/0x50 [ 1771.999917] do_syscall_64+0x3f/0x90 [ 1772.000177] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1772.000521] RIP: 0033:0x7f2fa4221b16 [ 1772.000766] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1772.001869] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1772.002349] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1772.002846] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1772.003353] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1772.003851] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000001 [ 1772.004358] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1772.004872] [ 1772.016591] loop6: detected capacity change from 0 to 256 [ 1772.017168] 9p: Unknown access argument À: -22 09:11:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x65000000}, {0x0, 0x0, 0x10000}]) [ 1772.048833] loop5: detected capacity change from 0 to 256 [ 1772.056647] loop6: detected capacity change from 0 to 256 09:11:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 96) 09:11:49 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 61) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:11:49 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:11:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7a00, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:11:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x80040000}, {0x0, 0x0, 0x10000}]) 09:11:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3d8d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:11:49 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x7a, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1772.174304] 9p: Unknown access argument À: -22 [ 1772.180842] loop7: detected capacity change from 0 to 256 [ 1772.189505] FAULT_INJECTION: forcing a failure. [ 1772.189505] name failslab, interval 1, probability 0, space 0, times 0 [ 1772.190539] CPU: 0 PID: 9974 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1772.191094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1772.191643] Call Trace: [ 1772.191829] [ 1772.191999] dump_stack_lvl+0xc1/0xf0 [ 1772.192290] should_fail_ex+0x4b4/0x5b0 [ 1772.192585] ? getname_flags.part.0+0x50/0x4f0 [ 1772.192928] should_failslab+0x9/0x20 [ 1772.193205] kmem_cache_alloc+0x5a/0x390 [ 1772.193503] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1772.193884] getname_flags.part.0+0x50/0x4f0 [ 1772.194197] ? putname+0x102/0x140 [ 1772.194470] getname_flags+0x9e/0xf0 [ 1772.194754] vfs_fstatat+0x77/0xb0 [ 1772.195014] __do_sys_newstat+0x81/0x100 [ 1772.195313] ? __pfx___do_sys_newstat+0x10/0x10 [ 1772.195655] ? perf_trace_preemptirq_template+0x252/0x420 [ 1772.196057] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1772.196470] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1772.196889] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1772.197212] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1772.197578] ? syscall_enter_from_user_mode+0x21/0x50 [ 1772.197954] do_syscall_64+0x3f/0x90 [ 1772.198211] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1772.198587] RIP: 0033:0x7f2fa4221b16 [ 1772.198851] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1772.200072] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1772.200603] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1772.201115] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1772.201626] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1772.202142] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000002 [ 1772.202662] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1772.203187] [ 1772.232354] loop5: detected capacity change from 0 to 256 [ 1772.247531] loop6: detected capacity change from 0 to 256 09:12:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x9000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:12:03 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:12:03 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x90, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:12:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc00) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7472616e733d66642c7266b9e4646e6f3da22e6320a01e8edf734b65e011295b8b3372ee838bf6c989eb686d2dad65c7ec45edd279c960c444c9db39f0c88a43d0652a15d8", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:03 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 62) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:12:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3e8d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 97) 09:12:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x8cffffff}, {0x0, 0x0, 0x10000}]) [ 1785.579169] loop5: detected capacity change from 0 to 256 [ 1785.637567] 9pnet_fd: Insufficient options for proto=fd [ 1785.643641] FAULT_INJECTION: forcing a failure. [ 1785.643641] name failslab, interval 1, probability 0, space 0, times 0 [ 1785.645187] CPU: 1 PID: 10008 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1785.646191] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1785.647184] Call Trace: [ 1785.647514] [ 1785.647810] dump_stack_lvl+0xc1/0xf0 [ 1785.648320] should_fail_ex+0x4b4/0x5b0 [ 1785.648855] ? __kernfs_new_node+0xd4/0x870 [ 1785.649409] should_failslab+0x9/0x20 [ 1785.649919] kmem_cache_alloc+0x5a/0x390 [ 1785.650464] __kernfs_new_node+0xd4/0x870 [ 1785.651017] ? __pfx___kernfs_new_node+0x10/0x10 [ 1785.651640] ? down_write+0x11a/0x1f0 [ 1785.652155] ? up_write+0x196/0x510 [ 1785.652647] kernfs_new_node+0x97/0x120 [ 1785.653177] __kernfs_create_file+0x55/0x350 [ 1785.653774] sysfs_add_file_mode_ns+0x21c/0x440 [ 1785.654381] ? __pfx_slab_attr_store+0x10/0x10 [ 1785.655015] internal_create_group+0x322/0xb90 [ 1785.655618] ? __pfx_internal_create_group+0x10/0x10 [ 1785.656277] ? up_write+0x196/0x510 [ 1785.656781] sysfs_slab_add+0x18e/0x220 [ 1785.657307] __kmem_cache_create+0x1fe/0x610 [ 1785.657902] kmem_cache_create_usercopy+0x218/0x340 [ 1785.658564] p9_client_create+0xd0b/0x1260 [ 1785.659135] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1785.659336] loop7: detected capacity change from 0 to 256 [ 1785.659796] ? __pfx_p9_client_create+0x10/0x10 [ 1785.661093] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1785.661742] ? lockdep_init_map_type+0x21e/0x7e0 [ 1785.662362] ? __kasan_kmalloc+0x7f/0x90 [ 1785.662953] ? __raw_spin_lock_init+0x3a/0x110 [ 1785.663570] v9fs_session_init+0x1e0/0x17b0 [ 1785.664156] ? __pfx_lock_release+0x10/0x10 [ 1785.664645] loop6: detected capacity change from 0 to 256 [ 1785.665392] ? __pfx_v9fs_session_init+0x10/0x10 [ 1785.666029] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1785.666713] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1785.667361] ? v9fs_mount+0x9e/0xbd0 [ 1785.667880] v9fs_mount+0xbd/0xbd0 [ 1785.668367] ? legacy_init_fs_context+0x44/0xe0 [ 1785.668968] ? __pfx_v9fs_mount+0x10/0x10 [ 1785.669525] ? cap_capable+0x1be/0x220 [ 1785.670069] ? __pfx_v9fs_mount+0x10/0x10 [ 1785.670630] legacy_get_tree+0x109/0x220 [ 1785.671193] vfs_get_tree+0x92/0x360 [ 1785.671710] path_mount+0x133c/0x1e50 [ 1785.672239] ? kasan_quarantine_put+0x81/0x1d0 [ 1785.672845] ? __pfx_path_mount+0x10/0x10 [ 1785.673398] ? putname+0x102/0x140 [ 1785.673882] ? kmem_cache_free+0xff/0x4a0 [ 1785.674436] ? putname+0x102/0x140 [ 1785.674944] __x64_sys_mount+0x286/0x310 [ 1785.675474] ? __pfx___x64_sys_mount+0x10/0x10 [ 1785.676070] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1785.676757] do_syscall_64+0x3f/0x90 [ 1785.677263] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1785.677945] RIP: 0033:0x7f378de9bb19 [ 1785.678426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1785.680663] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1785.681630] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1785.682540] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1785.683443] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1785.684349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1785.685252] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1785.686176] 09:12:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xeffdffff}, {0x0, 0x0, 0x10000}]) [ 1785.705760] 9pnet_fd: Insufficient options for proto=fd 09:12:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xc410, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:12:03 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1785.763807] loop6: detected capacity change from 0 to 256 [ 1785.812448] loop5: detected capacity change from 0 to 256 09:12:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3f00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:03 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 63) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:12:03 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xf0, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:12:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xf6ffffff}, {0x0, 0x0, 0x10000}]) [ 1785.887841] kmem_cache_create_usercopy(9p-fcall-cache) failed with error -12 [ 1785.888808] CPU: 0 PID: 10008 Comm: syz-executor.3 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1785.889836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1785.890851] Call Trace: [ 1785.891191] [ 1785.891492] dump_stack_lvl+0xc1/0xf0 [ 1785.892010] kmem_cache_create_usercopy+0x12b/0x340 [ 1785.892669] p9_client_create+0xd0b/0x1260 [ 1785.893231] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1785.893908] ? __pfx_p9_client_create+0x10/0x10 [ 1785.894520] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1785.895189] ? lockdep_init_map_type+0x21e/0x7e0 [ 1785.895806] ? __kasan_kmalloc+0x7f/0x90 [ 1785.896356] ? __raw_spin_lock_init+0x3a/0x110 [ 1785.896968] v9fs_session_init+0x1e0/0x17b0 [ 1785.897546] ? __pfx_lock_release+0x10/0x10 [ 1785.898111] ? __pfx_v9fs_session_init+0x10/0x10 [ 1785.898743] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1785.899423] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1785.900060] ? v9fs_mount+0x9e/0xbd0 [ 1785.900585] v9fs_mount+0xbd/0xbd0 [ 1785.901071] ? legacy_init_fs_context+0x44/0xe0 [ 1785.901680] ? __pfx_v9fs_mount+0x10/0x10 [ 1785.902228] ? cap_capable+0x1be/0x220 [ 1785.902757] ? __pfx_v9fs_mount+0x10/0x10 [ 1785.903313] legacy_get_tree+0x109/0x220 [ 1785.903867] vfs_get_tree+0x92/0x360 [ 1785.904380] path_mount+0x133c/0x1e50 [ 1785.904907] ? kasan_quarantine_put+0x81/0x1d0 [ 1785.905507] ? __pfx_path_mount+0x10/0x10 [ 1785.906055] ? putname+0x102/0x140 [ 1785.906532] ? kmem_cache_free+0xff/0x4a0 [ 1785.907098] ? putname+0x102/0x140 [ 1785.907582] __x64_sys_mount+0x286/0x310 [ 1785.908101] ? __pfx___x64_sys_mount+0x10/0x10 [ 1785.908692] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1785.909362] do_syscall_64+0x3f/0x90 [ 1785.909866] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1785.910536] RIP: 0033:0x7f378de9bb19 [ 1785.911018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1785.913209] RSP: 002b:00007f378b411188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1785.914144] RAX: ffffffffffffffda RBX: 00007f378dfaef60 RCX: 00007f378de9bb19 [ 1785.915033] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1785.915914] RBP: 00007f378b4111d0 R08: 0000000020000200 R09: 0000000000000000 [ 1785.916794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1785.917668] R13: 00007fffc0f9b4af R14: 00007f378b411300 R15: 0000000000022000 [ 1785.918569] 09:12:03 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:12:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xcc06, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1785.991818] loop6: detected capacity change from 0 to 256 [ 1785.997642] loop7: detected capacity change from 0 to 256 [ 1786.012536] FAULT_INJECTION: forcing a failure. [ 1786.012536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1786.014419] CPU: 0 PID: 10037 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1786.015432] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1786.016429] Call Trace: [ 1786.016760] [ 1786.017062] dump_stack_lvl+0xc1/0xf0 [ 1786.017581] should_fail_ex+0x4b4/0x5b0 [ 1786.018118] strncpy_from_user+0x38/0x340 [ 1786.018666] getname_flags.part.0+0x95/0x4f0 [ 1786.019254] ? putname+0x102/0x140 [ 1786.019731] getname_flags+0x9e/0xf0 [ 1786.020216] vfs_fstatat+0x77/0xb0 [ 1786.020701] __do_sys_newstat+0x81/0x100 [ 1786.021231] ? __pfx___do_sys_newstat+0x10/0x10 [ 1786.021833] ? perf_trace_preemptirq_template+0x252/0x420 [ 1786.022540] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1786.023313] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1786.024068] ? __do_softirq+0x6d4/0x7d4 [ 1786.024592] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1786.025269] ? syscall_enter_from_user_mode+0x21/0x50 [ 1786.025936] do_syscall_64+0x3f/0x90 [ 1786.026431] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1786.027107] RIP: 0033:0x7f2fa4221b16 [ 1786.027592] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1786.029768] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1786.030717] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1786.031607] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1786.032497] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1786.033380] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000002 [ 1786.034258] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1786.035168] [ 1786.050182] 9p: Unknown access argument À: -22 [ 1786.070507] loop6: detected capacity change from 0 to 256 09:12:16 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 64) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:12:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3f8d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 98) 09:12:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x108000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache}, {@debug}, {@version_9p2000}, {@cache_fscache}, {@access_any}, {@cache_none}], [{@dont_hash}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@uid_eq={'uid', 0x3d, r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, '9p\x00'}}, {@subj_role={'subj_role', 0x3d, '9p\x00'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,bfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)=@chain) keyctl$chown(0x4, r5, r2, r4) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xee00, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:12:16 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:12:16 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xf8, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:12:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfcfdffff}, {0x0, 0x0, 0x10000}]) [ 1798.327637] loop5: detected capacity change from 0 to 256 [ 1798.352055] loop6: detected capacity change from 0 to 256 09:12:16 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1798.358477] 9p: Unknown access argument À: -22 09:12:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1798.377070] loop6: detected capacity change from 0 to 256 09:12:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1798.419842] loop7: detected capacity change from 0 to 256 [ 1798.434458] loop5: detected capacity change from 0 to 256 09:12:16 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xfe, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1798.464402] FAULT_INJECTION: forcing a failure. [ 1798.464402] name failslab, interval 1, probability 0, space 0, times 0 [ 1798.466613] CPU: 0 PID: 10060 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1798.467602] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1798.468583] Call Trace: [ 1798.468904] [ 1798.469189] dump_stack_lvl+0xc1/0xf0 [ 1798.469698] should_fail_ex+0x4b4/0x5b0 [ 1798.470213] should_failslab+0x9/0x20 [ 1798.470711] kmem_cache_alloc_lru+0x6b/0x600 [ 1798.471281] ? __d_alloc+0x31/0x9c0 [ 1798.471762] __d_alloc+0x31/0x9c0 [ 1798.472204] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1798.472874] d_alloc_parallel+0x10e/0x1640 [ 1798.473445] ? static_obj+0x1a/0xc0 [ 1798.473920] ? __pfx_d_alloc_parallel+0x10/0x10 [ 1798.474561] ? lockdep_init_map_type+0x21e/0x7e0 [ 1798.475216] ? lockdep_init_map_type+0x21e/0x7e0 [ 1798.475871] __lookup_slow+0x193/0x470 [ 1798.476433] ? __pfx___lookup_slow+0x10/0x10 09:12:16 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1798.477069] ? lookup_fast+0x14e/0x530 [ 1798.477777] walk_component+0x345/0x5b0 [ 1798.478454] path_lookupat+0x1ba/0x850 [ 1798.479164] filename_lookup+0x1d2/0x590 [ 1798.479868] ? __pfx_filename_lookup+0x10/0x10 [ 1798.480699] ? find_held_lock+0x2c/0x110 09:12:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf401, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1798.481425] ? __might_fault+0xe2/0x190 [ 1798.482154] ? lock_release+0x1e3/0x680 [ 1798.482799] ? __virt_addr_valid+0x102/0x340 [ 1798.483448] vfs_statx+0x14c/0x430 [ 1798.483944] ? __pfx_vfs_statx+0x10/0x10 [ 1798.484579] ? getname_flags.part.0+0x1dd/0x4f0 [ 1798.485435] vfs_fstatat+0x90/0xb0 [ 1798.485942] __do_sys_newstat+0x81/0x100 [ 1798.486506] ? __pfx___do_sys_newstat+0x10/0x10 [ 1798.487155] ? perf_trace_preemptirq_template+0x252/0x420 [ 1798.487937] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1798.487988] loop6: detected capacity change from 0 to 256 [ 1798.488695] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1798.489888] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1798.490594] ? syscall_enter_from_user_mode+0x21/0x50 [ 1798.491316] do_syscall_64+0x3f/0x90 [ 1798.491866] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1798.492576] RIP: 0033:0x7f2fa4221b16 [ 1798.493071] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1798.495403] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1798.496375] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1798.497294] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1798.498224] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1798.499179] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000001 [ 1798.500111] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1798.501071] [ 1798.524369] 9p: Unknown access argument À: -22 [ 1798.527444] loop6: detected capacity change from 0 to 256 09:12:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x408d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 99) [ 1798.542301] 9p: Unknown access argument À: -22 [ 1798.606893] 9p: Unknown access argument À: -22 09:12:16 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 65) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:12:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfeffffff}, {0x0, 0x0, 0x10000}]) 09:12:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf800, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:12:16 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x180, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:12:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) (fail_nth: 100) 09:12:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x418d000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:16 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1798.668813] loop5: detected capacity change from 0 to 256 [ 1798.669556] loop6: detected capacity change from 0 to 256 [ 1798.683983] loop6: detected capacity change from 0 to 256 [ 1798.731671] loop7: detected capacity change from 0 to 256 [ 1798.741791] 9p: Unknown access argument À: -22 09:12:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x4302000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="fbfffffeffffffffc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1813.394928] 9p: Unknown access argument À: -22 09:12:31 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:12:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfeff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:12:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x1c0, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:12:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfffff000}, {0x0, 0x0, 0x10000}]) 09:12:31 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 66) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1813.435740] loop7: detected capacity change from 0 to 256 09:12:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x2, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1813.444161] loop6: detected capacity change from 0 to 256 [ 1813.459650] loop5: detected capacity change from 0 to 256 [ 1813.478013] 9pnet_fd: Insufficient options for proto=fd [ 1813.481093] loop6: detected capacity change from 0 to 256 [ 1813.504800] 9pnet_fd: Insufficient options for proto=fd 09:12:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8cffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:45 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:12:45 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x1c1, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:12:45 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x101, 0x3, &(0x7f0000000440)=[{&(0x7f0000000240)="75f5514aa8a79ccf4922a68128b0fa1f4087cddaa95b5205e5540b422d029ee2b8f46770bd9a5d38c08133f01b7b5b348891f2c47964d6a21c6f84846cff551d2c3753598484de62f8d6f6b2969e421ce14d711d62e2b906017bfdd5f16d0ab9ebc152ba9292d8e1bf47031c2364a558ec0a16e80a7539f59183ff1e0a50512d16", 0x81, 0x101}, {&(0x7f0000000140)="efbeaa535a65b540547f363616b31d8d03de62aecb11fc99c81c3f5c7d0ee329251897098e8a6b4239719315124fe6d0091dfacfb9043284cf81f853cb39838ae9e5a6026df0586c9e8016f5a8081335e1164376e4b032cdf52cf9a762389e3a56432341d6f72a3a2f", 0x69, 0x4}, {&(0x7f0000000300)="f7b87e2c44540dc82ffa65cea324fe51990599d261db90477e013c1fcf789097dc1a18d66f57f6b4fa4c559110ccd1b7aec61afa86dc3ec5f029cd4070a66e21a968f43efdfad062c4465cd645aee93249dc81067106f4f08012b581d21c097f0b49a50f8914d0b158109ad537491ef3248c2df7dda8da89f16684dd042703", 0x7f, 0x4be53182}], 0x1012, &(0x7f00000004c0)={[{@block}, {@mode={'mode', 0x3d, 0x3d8000000}}, {@cruft}, {@check_strict}, {@nocompress}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@seclabel}, {@dont_hash}, {@hash}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x64, 0x65, 0x66, 0x33, 0x38, 0x36, 0x64], 0x2d, [0x35, 0x66, 0x62, 0x65], 0x2d, [0x37, 0x30, 0x66, 0x61], 0x2d, [0x62, 0x31, 0x33, 0x38], 0x2d, [0x31, 0x32, 0x39, 0x33, 0x34, 0x32, 0x39, 0x61]}}}, {@fowner_lt={'fowner<', 0xee01}}]}) close_range(r1, r3, 0x0) statx(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x6000, 0x7ff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r4) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r6, 0x0) syz_mount_image$tmpfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0xc32, 0x7, &(0x7f00000018c0)=[{&(0x7f0000000640)="faa02fca9c9d8c016cecdb1c9d2935518fcbd9959d41faae00e215c4a83705e17bb86f50188c5226151db3bc10055d74148045", 0x33, 0x40}, {&(0x7f0000000680)="028cbdb364e9083c7170d7e8b141bfa9054fc5", 0x13, 0x5}, {&(0x7f00000006c0)="fab7ddaab833eb7f03252d5bba64b5d30c2ce758c0ccfb3fbe79b7b490ce2747f8c66358f9b044af2fa7b4eec45f26d8399c854ced18ca594a35c870a425754603463b4a5cb0cb6f2a21e967064841caef3bfda5898ed5e0cc0bed53f302", 0x5e, 0x9}, {&(0x7f0000000740)="82b5626a23e37520d7103e65c13e5762b1dfc236d124d70553e57ef19f1e53cc7bdbf2d792262bf1fe9ca0", 0x2b, 0x8}, {&(0x7f0000000780)}, {&(0x7f00000007c0)="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", 0x1000, 0x1}, {&(0x7f00000017c0)="8634b9d4e745ee92af05683eb3010076d0133be632747db251e0ef315fd1750a71a644dce5689dee737f33e534288b5e377bde74176d8f3ffd5e87c73a279859d762e683dd446f86224d5466e1b67f0ad7519f1316f490704ce935896afbfc4850142dd6ef0959096abda133e20d9d6984f1efa0bf918d780d01654a797f31a589d472cbb5e3252f17c45a570001dd7d45f9a63091388502a7b5c29887fad54a6616b508237078e1b1418983af7f833576c029f32493292c8ccfbd18fce02690b830c2c9fc066704c4a8d8", 0xcb, 0x634}], 0x420, &(0x7f0000001980)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0xee01, @ANYBLOB="3fbfbae368696e5f73697b652c6769643d", @ANYRESHEX=r4, @ANYBLOB=',size=pk2,nr_blocks=p54%3p,euid>', @ANYRESDEC=r5, @ANYBLOB=',defcontext=sysadm_u,smackfsfloor=seclabel,appraise,obj_type=gid,uid>', @ANYRESDEC=r6, @ANYBLOB=',fowner=', @ANYRESDEC=0xee01, @ANYBLOB="2c646f6e745f61707072616973652c6673636f6e746578743d726f6f742c6673757569643d36643661306632662d353338642d006263642d363060372d38313035063637332c00"]) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="74726187733d6f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f0000002f00)={&(0x7f0000000780)={0xa, 0x4e24, 0x10000, @loopback, 0x1ff}, 0x1c, &(0x7f0000002dc0)=[{0x0}, {&(0x7f0000001ac0)="dd28549b1e021da9c33a7b1f549b1f62a3fdbe889a9ac58a11b89377314ad6a700709e51d45e5d0e4fa7d2822c3fd2214c1877317d37d0884d64af5137eb2a2e18e79f79f959b0d126febdd9db39aa840cfd54d54c9bd95807aea987dd745d477001d233356aff554406b90ebe15c04f51d1caf387596698a55b579a3cbbcf32fd9c02db367c19b752924b8b2902ca6f131a0d787cc51fcc331ec59640df1f814de9eddc63843452f3fad8b35c712f19b823ba73140d84b442adb21a272476be288d0390966138d6674dc6b3143b368407693c5db68911db47231ad374966e3c4e67a7da340ffd", 0xe7}, {&(0x7f0000001bc0)="a4476f27294917899134d40878400d6d3605acc45332d82474679069c3d72e526f0cea80d590b70b6367a2a1c46bf281422a287756496b00b7aa7f33b30d01f6f6729368701f8912b3a289a5cf37ae04aee8eb69193e75ba3d50a7a7a9f851452d81f015621f5d769ad007c6c960f0afcdcac3cd7d030732c4dbe131551742ba945c910f14df537d9d16760e0bdc238da45faa9d", 0x94}, {&(0x7f0000001c80)="e4ab659c0a080011993f8b69e4b72d6237a2238889d4ef42777999c5f51f2a", 0x1f}, {&(0x7f0000001cc0)="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", 0x1000}, {&(0x7f0000002cc0)="784b744b9270b6f21d58f491cfe3ae498967ac2581a8cef967a68217b274ba048a49823e9f35cdfafbc3350d19bc71110819f21a8a529348250bfd30cb68b19c458bd3dbd353d0770d872f612d6ff40716253e73cb7abccdd131369dd760b983f50c02df36c132a969f0d16d7de68dfbd6aef59edd02b0026a3e7692bb8f8c7158b61f5c112ffbf02eb97f8469cdb2a8b6b6853ae63216f1c85049d6453eae6b0446086eda7eda96938f3a4f7dac49c5bce288705c90c7edaddd35407e3ad6ddc589e45ef4eab00f39641c57199e005be1ff30046e0121c33baef2aa2843", 0xde}], 0x6, &(0x7f0000002e40)=[@hopopts_2292={{0x88, 0x29, 0x36, {0x33, 0xe, '\x00', [@enc_lim={0x4, 0x1, 0x3f}, @generic={0x1f, 0x45, "b8256e80e289e1962784c381e7cb619cbbccf9c01209e01ad1bae2a2784734be12980f576326ec00e82b6655ee84df6a72fe69eae0bc57aa7f8aeeeccbae4b225ca4a69626"}, @jumbo={0xc2, 0x4, 0x80}, @calipso={0x7, 0x18, {0x2, 0x4, 0x3, 0x9, [0x8, 0x4]}}, @jumbo={0xc2, 0x4, 0x81}]}}}], 0x88}, 0x0) 09:12:45 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfffffdef}, {0x0, 0x0, 0x10000}]) 09:12:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x3, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:12:45 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 67) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:12:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xff00, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1828.238746] loop5: detected capacity change from 0 to 256 [ 1828.263220] loop6: detected capacity change from 0 to 256 [ 1828.266180] loop7: detected capacity change from 0 to 256 [ 1828.282836] FAULT_INJECTION: forcing a failure. [ 1828.282836] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1828.284355] CPU: 1 PID: 10158 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1828.285282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1828.286209] Call Trace: [ 1828.286515] [ 1828.286961] dump_stack_lvl+0xc1/0xf0 [ 1828.287484] should_fail_ex+0x4b4/0x5b0 [ 1828.287984] strncpy_from_user+0x38/0x340 09:12:46 executing program 1: r0 = dup(0xffffffffffffffff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000001a80)={0x9, 0xe2, 0xa, 0x0, 0x0, [{{}, 0x1f}, {{}, 0x3}, {{}, 0x1}, {{}, 0xae4e}, {{}, 0x2}, {{}, 0x10000}, {{}, 0x86a2}, {{}, 0x8d5a}, {{}, 0x8000}, {{r0}, 0x9b3}]}) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x800) r5 = syz_open_dev$loop(&(0x7f0000000280), 0xfffffffffffffff9, 0x14181) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x4e24, 0x2d0e, @ipv4={'\x00', '\xff\xff', @remote}, 0x5}, 0x1c) statx(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x6000, 0x7ff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r6) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000001980)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r6}}, {@posixacl}, {@access_client}, {@version_L}, {@posixacl}, {@loose}], [{@subj_type={'subj_type', 0x3d, '&\xd2^['}}, {@dont_measure}, {@smackfsfloor={'smackfsfloor', 0x3d, ','}}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x35, 0x61, 0x37, 0x65, 0x63, 0x35, 0x31], 0x2d, [0x39, 0x0, 0x63, 0x61], 0x2d, [0x62, 0x39, 0x30, 0x66], 0x2d, [0x35, 0x61, 0x61, 0x37], 0x2d, [0x35, 0x38, 0x32, 0x39, 0x63, 0x31, 0x62, 0x39]}}}]}}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x233b2764, 0x4, &(0x7f0000000700)=[{&(0x7f0000000980)="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", 0x1000, 0xe5ae}, {&(0x7f0000000540)="70912f5f19213fed00fa91cbd01ffc54e2ced68135f8c0548144352d4b8f945e09709a8e8331d06dae8bd2381c0881675c016b60794ce3b71dc297710af95f67bb33b6bd2f832b17176214f99eea281ea2a1c55c8a6dd67173e5b84cb5be40b498635c97ad259f7b7578294e46ca4e229664e0be", 0x74, 0x80000001}, {&(0x7f00000005c0)="64eec7c4fd9a8b82cd260861b90f566d86d9b00cdac4cfacce8b322698b6a0f6116084d6f143b5a1981ecba7be3a1310be5cb55c70b6e0644a06fa00492f65157aace57259a329f12a274022e249486ecca87a292051770999dd2eeb49401e6764d1ec4580660e462481637085ca420968fb235fd5732f5abe6ba8d63545711d272051836326a28522c77d8cd63d1db117396197139df2b6f8191bdc8f9e", 0x9e, 0x5}, {&(0x7f0000000680)="f8bc5e132053d2c83c39f45a866deba7dcc95690ebd45505d7885f185c7cdc04193731c84d90c3a51a172ad7330a8995458a23efbaa923e3cd157b00a4f6de5957ce41caf847655e14167da86aef7ceb110de006469d9ade5fd15adf1530e96b8dc31cd3d96bf9d3f7c6", 0x6a, 0x5a00}], 0x2040004, &(0x7f0000000780)={[{@fat=@sys_immutable}, {@dots}], [{@permit_directio}, {@obj_role={'obj_role', 0x3d, ';%)\x14}!'}}]}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1828.288489] getname_flags.part.0+0x95/0x4f0 [ 1828.289136] ? putname+0x102/0x140 [ 1828.289580] getname_flags+0x9e/0xf0 [ 1828.290065] vfs_fstatat+0x77/0xb0 [ 1828.290539] __do_sys_newstat+0x81/0x100 [ 1828.291058] ? __pfx___do_sys_newstat+0x10/0x10 [ 1828.291662] ? perf_trace_preemptirq_template+0x252/0x420 [ 1828.292376] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1828.293119] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1828.293872] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1828.294525] ? syscall_enter_from_user_mode+0x21/0x50 [ 1828.295195] do_syscall_64+0x3f/0x90 [ 1828.295678] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1828.296330] RIP: 0033:0x7f2fa4221b16 [ 1828.296773] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1828.298914] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1828.299808] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1828.300672] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1828.301525] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1828.302373] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000003 [ 1828.303235] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1828.304124] 09:12:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfffffdfc}, {0x0, 0x0, 0x10000}]) 09:12:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa0ac010000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1828.369880] 9pnet_fd: Insufficient options for proto=fd 09:12:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x4, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1828.384333] 9p: Unknown access argument À: -22 [ 1828.385682] loop6: detected capacity change from 0 to 256 09:12:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffe, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:12:46 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1828.397859] 9pnet_fd: Insufficient options for proto=fd [ 1828.435790] 9p: Unknown access argument À: -22 09:12:46 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 68) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1828.463550] loop5: detected capacity change from 0 to 256 09:12:46 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x229, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1828.543073] loop7: detected capacity change from 0 to 256 09:12:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1af46, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:12:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x5, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:12:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xffffff8c}, {0x0, 0x0, 0x10000}]) 09:12:46 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1828.577631] loop6: detected capacity change from 0 to 256 [ 1828.594558] loop5: detected capacity change from 0 to 256 [ 1828.650354] loop6: detected capacity change from 0 to 256 09:12:59 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x22e, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:12:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb97f010000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x6, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:12:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1af87, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:12:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) mknodat$null(r3, &(0x7f0000000080)='./file0\x00', 0x8000, 0x103) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:59 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 69) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:12:59 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:12:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfffffff6}, {0x0, 0x0, 0x10000}]) [ 1841.574734] loop7: detected capacity change from 0 to 256 [ 1841.593516] FAULT_INJECTION: forcing a failure. [ 1841.593516] name failslab, interval 1, probability 0, space 0, times 0 [ 1841.594598] CPU: 1 PID: 10218 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1841.595440] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1841.596318] Call Trace: [ 1841.596599] [ 1841.596845] dump_stack_lvl+0xc1/0xf0 [ 1841.597275] should_fail_ex+0x4b4/0x5b0 [ 1841.597728] ? getname_flags.part.0+0x50/0x4f0 [ 1841.598228] should_failslab+0x9/0x20 [ 1841.598645] kmem_cache_alloc+0x5a/0x390 [ 1841.599096] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1841.599681] getname_flags.part.0+0x50/0x4f0 [ 1841.600166] ? putname+0x102/0x140 [ 1841.600567] getname_flags+0x9e/0xf0 [ 1841.600964] vfs_fstatat+0x77/0xb0 [ 1841.601361] __do_sys_newstat+0x81/0x100 [ 1841.601802] ? __pfx___do_sys_newstat+0x10/0x10 [ 1841.602305] ? perf_trace_preemptirq_template+0x252/0x420 [ 1841.602899] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1841.603565] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1841.604188] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1841.604607] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1841.605156] ? syscall_enter_from_user_mode+0x21/0x50 [ 1841.605633] do_syscall_64+0x3f/0x90 [ 1841.606043] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1841.606522] RIP: 0033:0x7f2fa4221b16 [ 1841.606922] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1841.608776] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1841.609560] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1841.610294] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1841.611039] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1841.611775] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000003 [ 1841.612504] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1841.612536] loop6: detected capacity change from 0 to 256 [ 1841.613247] [ 1841.616543] loop5: detected capacity change from 0 to 256 [ 1841.619852] 9pnet_fd: Insufficient options for proto=fd 09:12:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfffffffe}, {0x0, 0x0, 0x10000}]) 09:12:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xe4ffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:12:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x7, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1841.744127] loop6: detected capacity change from 0 to 256 [ 1842.123874] 9pnet_fd: Insufficient options for proto=fd 09:13:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x20000000000}, {0x0, 0x0, 0x10000}]) 09:13:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x18000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:13:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xff, 0x4, 0x8, 0x9, 0x0, 0x3f, 0x100, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000080)}, 0x400, 0x1, 0x7ff, 0x1, 0x1, 0x72f2, 0xd373, 0x0, 0x81, 0x0, 0x2}, r1, 0xe, r2, 0x9) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYRES64=r0, @ANYRES64, @ANYBLOB=',wfdno=', @ANYRES16, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:13:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xf6ffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:13:12 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 70) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:13:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x8, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:13:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x23e, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:13:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x80000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1854.860609] loop6: detected capacity change from 0 to 256 [ 1854.865720] loop7: detected capacity change from 0 to 256 [ 1854.875812] FAULT_INJECTION: forcing a failure. [ 1854.875812] name failslab, interval 1, probability 0, space 0, times 0 [ 1854.876746] CPU: 0 PID: 10252 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1854.877300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1854.877845] Call Trace: [ 1854.878030] [ 1854.878191] dump_stack_lvl+0xc1/0xf0 [ 1854.878478] should_fail_ex+0x4b4/0x5b0 [ 1854.878770] ? getname_flags.part.0+0x50/0x4f0 [ 1854.879100] should_failslab+0x9/0x20 [ 1854.879380] kmem_cache_alloc+0x5a/0x390 [ 1854.879680] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1854.880050] getname_flags.part.0+0x50/0x4f0 [ 1854.880370] ? putname+0x102/0x140 [ 1854.880631] getname_flags+0x9e/0xf0 [ 1854.880899] vfs_fstatat+0x77/0xb0 [ 1854.881171] __do_sys_newstat+0x81/0x100 [ 1854.881472] ? __pfx___do_sys_newstat+0x10/0x10 [ 1854.881806] ? perf_trace_preemptirq_template+0x252/0x420 [ 1854.882201] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1854.882609] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1854.883025] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1854.883386] ? syscall_enter_from_user_mode+0x21/0x50 [ 1854.883772] do_syscall_64+0x3f/0x90 [ 1854.884044] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1854.884417] RIP: 0033:0x7f2fa4221b16 [ 1854.884679] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1854.885884] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1854.886401] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1854.886881] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1854.887358] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1854.887848] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000004 [ 1854.888325] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1854.888808] [ 1854.912819] loop6: detected capacity change from 0 to 256 09:13:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1854.922221] loop5: detected capacity change from 0 to 1024 09:13:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x9, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:13:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x300, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:13:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xffff000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:13:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x100000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:13:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x110080, &(0x7f0000000100)=ANY=[@ANYBLOB='trass=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESOCT=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:13:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:13:12 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 71) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1855.051628] loop7: detected capacity change from 0 to 256 09:13:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x1000000000000}, {0x0, 0x0, 0x10000}]) [ 1855.068650] FAULT_INJECTION: forcing a failure. [ 1855.068650] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.069601] CPU: 0 PID: 10277 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1855.070155] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1855.070705] Call Trace: [ 1855.070888] [ 1855.071054] dump_stack_lvl+0xc1/0xf0 [ 1855.071340] should_fail_ex+0x4b4/0x5b0 [ 1855.071639] ? getname_flags.part.0+0x50/0x4f0 [ 1855.071976] should_failslab+0x9/0x20 [ 1855.072253] kmem_cache_alloc+0x5a/0x390 [ 1855.072554] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1855.072945] getname_flags.part.0+0x50/0x4f0 [ 1855.073261] getname_flags+0x9e/0xf0 [ 1855.073538] vfs_fstatat+0x77/0xb0 [ 1855.073804] __do_sys_newstat+0x81/0x100 [ 1855.074098] ? __pfx___do_sys_newstat+0x10/0x10 [ 1855.074429] ? perf_trace_preemptirq_template+0x252/0x420 [ 1855.074819] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1855.075256] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1855.075689] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1855.076071] ? syscall_enter_from_user_mode+0x21/0x50 [ 1855.076436] do_syscall_64+0x3f/0x90 [ 1855.076718] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1855.077078] RIP: 0033:0x7f2fa4221b16 [ 1855.077349] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1855.078561] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1855.079106] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1855.079620] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1855.080142] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1855.080655] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000003 [ 1855.081173] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1855.081697] [ 1855.096378] loop6: detected capacity change from 0 to 256 [ 1855.114530] loop5: detected capacity change from 0 to 2048 09:13:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x23110000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1855.160461] loop6: detected capacity change from 0 to 256 09:13:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xffffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:13:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x8000000000000}, {0x0, 0x0, 0x10000}]) 09:13:26 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x500, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:13:26 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 72) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:13:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r2, 0x29, 0x37, &(0x7f0000000100)={0x2e, 0x16, '\x00', [@hao={0xc9, 0x10, @empty}, @pad1, @generic={0x1}, @generic={0xee, 0x6e, "c4a908c93f3984f1b009481a35ce9ccb40f5b8b0d36397ae20fc94e0f7481a05bba8aa67a38b7d937e550722ed9ce2916beb8cb592c2e55f39aa625647e65f9edd334822d83bdcd029235b304bb0fcc3a358857fc03a624cf4fbd839365aaeb8d9c90a1fb8e07c44c6c72ef505d9"}, @jumbo={0xc2, 0x4, 0x5}, @calipso={0x7, 0x10, {0x0, 0x2, 0xff, 0x8000, [0x20200000000000]}}, @hao={0xc9, 0x10, @remote}]}, 0xc0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) statx(r0, &(0x7f00000002c0)='./file0\x00', 0x1000, 0x4, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280), 0x10, &(0x7f0000000540)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_L}, {@cache_none}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@euid_lt={'euid<', r5}}]}}) 09:13:26 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x10, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:13:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x400000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:13:26 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x25000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1869.108398] loop5: detected capacity change from 0 to 8192 09:13:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x20000000000000}, {0x0, 0x0, 0x10000}]) 09:13:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x900000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:13:26 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x48, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1869.180489] loop7: detected capacity change from 0 to 256 [ 1869.186254] FAULT_INJECTION: forcing a failure. [ 1869.186254] name failslab, interval 1, probability 0, space 0, times 0 [ 1869.187021] CPU: 1 PID: 10322 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1869.187551] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1869.188095] Call Trace: [ 1869.188275] [ 1869.188437] dump_stack_lvl+0xc1/0xf0 [ 1869.188717] should_fail_ex+0x4b4/0x5b0 [ 1869.189003] should_failslab+0x9/0x20 [ 1869.189272] kmem_cache_alloc_lru+0x6b/0x600 [ 1869.189581] ? __d_alloc+0x31/0x9c0 [ 1869.189850] __d_alloc+0x31/0x9c0 [ 1869.190095] ? __lock_acquire+0x19b1/0x6340 [ 1869.190399] d_alloc_parallel+0x10e/0x1640 [ 1869.190699] ? __pfx___lock_acquire+0x10/0x10 [ 1869.191010] ? __pfx_d_alloc_parallel+0x10/0x10 [ 1869.191330] ? lockdep_init_map_type+0x21e/0x7e0 [ 1869.191652] ? lockdep_init_map_type+0x21e/0x7e0 [ 1869.191992] __lookup_slow+0x193/0x470 [ 1869.192274] ? __pfx___lookup_slow+0x10/0x10 [ 1869.192602] ? lookup_fast+0x14e/0x530 [ 1869.192879] walk_component+0x345/0x5b0 [ 1869.193157] path_lookupat+0x1ba/0x850 [ 1869.193429] filename_lookup+0x1d2/0x590 [ 1869.193709] ? __pfx_filename_lookup+0x10/0x10 [ 1869.194031] ? find_held_lock+0x2c/0x110 [ 1869.194325] ? __might_fault+0xe2/0x190 [ 1869.194601] ? lock_release+0x1e3/0x680 [ 1869.194881] ? __virt_addr_valid+0x102/0x340 [ 1869.195194] vfs_statx+0x14c/0x430 [ 1869.195452] ? __pfx_vfs_statx+0x10/0x10 [ 1869.195736] ? getname_flags.part.0+0x1dd/0x4f0 [ 1869.196071] ? putname+0x102/0x140 [ 1869.196331] vfs_fstatat+0x90/0xb0 [ 1869.196590] __do_sys_newstat+0x81/0x100 [ 1869.196890] ? __pfx___do_sys_newstat+0x10/0x10 [ 1869.197216] ? perf_trace_preemptirq_template+0x252/0x420 [ 1869.197597] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1869.197994] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1869.198390] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1869.198696] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1869.199049] ? syscall_enter_from_user_mode+0x21/0x50 [ 1869.199402] do_syscall_64+0x3f/0x90 [ 1869.199664] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1869.200031] RIP: 0033:0x7f2fa4221b16 [ 1869.200288] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1869.201447] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1869.201944] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1869.202420] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1869.202885] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1869.203353] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000003 [ 1869.203826] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1869.204319] [ 1869.217712] 9p: Unknown access argument À: -22 [ 1869.220640] loop6: detected capacity change from 0 to 256 [ 1869.223699] loop5: detected capacity change from 0 to 18432 [ 1869.267818] 9p: Unknown access argument Àile0: -22 [ 1869.332262] loop6: detected capacity change from 0 to 256 09:13:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x600, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:13:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf0ffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:13:40 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 73) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1882.490871] loop5: detected capacity change from 0 to 30847 09:13:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) r4 = syz_open_dev$rtc(&(0x7f0000000080), 0x8, 0x0) pidfd_getfd(r3, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:13:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x4c, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1882.518408] loop6: detected capacity change from 0 to 256 09:13:40 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2c020000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:13:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xf0ffffffffffff}, {0x0, 0x0, 0x10000}]) 09:13:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xffffffff84800000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:13:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x100000000000000}, {0x0, 0x0, 0x10000}]) [ 1882.537866] loop6: detected capacity change from 0 to 256 09:13:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x68, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1882.569150] loop7: detected capacity change from 0 to 256 09:13:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1882.595145] 9p: Unknown access argument À: -22 09:13:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x700, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:13:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:13:40 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:13:40 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 74) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1882.642781] loop6: detected capacity change from 0 to 256 09:13:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x200000000000000}, {0x0, 0x0, 0x10000}]) [ 1882.689686] loop5: detected capacity change from 0 to 32768 09:13:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x6c, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:13:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x900, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1882.715663] 9p: Unknown access argument Ày: -22 [ 1882.731561] loop7: detected capacity change from 0 to 256 09:13:40 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1882.789362] loop6: detected capacity change from 0 to 256 [ 1882.806185] loop6: detected capacity change from 0 to 256 [ 1883.140669] 9p: Unknown access argument À: -22 09:13:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x300000000000000}, {0x0, 0x0, 0x10000}]) 09:13:53 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 75) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:13:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r2, 0x80047210, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e3b8a6606007266646e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:13:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x74, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:13:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:13:53 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xa00, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:13:53 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x4e000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1895.618180] loop5: detected capacity change from 0 to 65536 [ 1895.626681] loop7: detected capacity change from 0 to 256 09:13:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1895.636791] loop6: detected capacity change from 0 to 256 [ 1895.641669] FAULT_INJECTION: forcing a failure. [ 1895.641669] name failslab, interval 1, probability 0, space 0, times 0 [ 1895.643363] CPU: 0 PID: 10412 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1895.643923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1895.644622] Call Trace: [ 1895.644821] [ 1895.644987] dump_stack_lvl+0xc1/0xf0 [ 1895.645274] should_fail_ex+0x4b4/0x5b0 [ 1895.645620] ? getname_flags.part.0+0x50/0x4f0 [ 1895.646017] should_failslab+0x9/0x20 [ 1895.646300] kmem_cache_alloc+0x5a/0x390 [ 1895.646679] ? clockevents_program_event+0x14f/0x360 [ 1895.647060] getname_flags.part.0+0x50/0x4f0 [ 1895.647445] getname_flags+0x9e/0xf0 [ 1895.647778] vfs_fstatat+0x77/0xb0 [ 1895.648122] __do_sys_newstat+0x81/0x100 [ 1895.648448] ? __pfx___do_sys_newstat+0x10/0x10 [ 1895.648869] ? perf_trace_preemptirq_template+0x252/0x420 [ 1895.649294] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1895.649820] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1895.650316] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1895.650717] ? syscall_enter_from_user_mode+0x21/0x50 [ 1895.651088] do_syscall_64+0x3f/0x90 [ 1895.651363] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1895.651735] RIP: 0033:0x7f2fa4221b16 [ 1895.652000] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1895.653298] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1895.653848] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1895.654345] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1895.654822] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1895.655299] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000005 [ 1895.655772] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1895.656299] 09:13:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1895.688282] loop6: detected capacity change from 0 to 256 [ 1895.721594] 9p: Unknown access argument Ày: -22 09:13:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x7, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:13:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x400000000000000}, {0x0, 0x0, 0x10000}]) [ 1895.741788] loop5: detected capacity change from 0 to 98304 09:13:53 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x65000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:13:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x7a, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:13:53 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xd00, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:13:53 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 76) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:13:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c74f2729e000000006fb6ceff8513addac33e72bd42eeb905994488b52b4f6db66a41b3322bd5aaee2f4ae45a1e1b1ac21a0d63f95a7bdf3abfc79f6c0e1722048269decfa5f04f3b26e4a00b25ce0cbbe4224a9cfe4e039ef02f2832459b87620e7755dedb9ff6470386cda0fea38d33eaccd9fa8d1f5b181a70e9b121ca2a91b86d811b443a2b5ea372d30e005620719512b9ffcce8fa3ffa5d80008437d9cbbeca59dd4fd338079839c7a0326460103f251ba4c1a8adf40c62b539d8b02da7d7377191f2bd74204f27d47ab6f591ab83c7f4fac22bde38fc19587676acc453f5b0364f428f04952bfcfca29b159715a7328adc51e40cb02d0ab45799e2dc82e615f61e0a1985e977e56aee779e1f55a76722a9c3c7c67480f37dd684a8dcf610ee1a5314d2f756669406e471b09d9157985cefd7de6cdbcb84beae71efc01247ffd02d3ebb0414876dbfeec47fc8f0e5ee85a051c5a8fedc7347d7308472d6b21b853264314ab7f43718847e25d69c210a16fa59b3721ec524180239e5358c89612a15cc91d521268aa718e81f82"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r2, 0x0) syz_io_uring_submit(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x4, 0x353084) syz_io_uring_submit(r3, 0x0, &(0x7f0000000100)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd=r4, 0x800, 0x0, 0x2, 0x5}, 0x8) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1895.849813] loop7: detected capacity change from 0 to 256 [ 1895.853776] loop6: detected capacity change from 0 to 256 09:13:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1895.889315] loop6: detected capacity change from 0 to 256 [ 1895.893358] 9p: Unknown access argument Ày: -22 [ 1895.930703] loop5: detected capacity change from 0 to 131072 [ 1895.943569] 9p: Unknown access argument Ày: -22 09:14:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x500000000000000}, {0x0, 0x0, 0x10000}]) [ 1909.860556] loop6: detected capacity change from 0 to 256 09:14:07 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x80040000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:14:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x300, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:14:07 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xf00, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:14:07 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 77) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:14:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:14:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:14:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount(&(0x7f0000000180)=@md0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='ecryptfs\x00', 0xa0, &(0x7f0000000300)='[\xd9*\\[*\xa1}\x00') r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x8010, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x101, &(0x7f0000000080), &(0x7f0000ffb000/0x1000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, r3, 0x0, 0x8001) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000440)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x1, &(0x7f0000000340), 0x1, 0x0, 0x1, {0x0, r4}}, 0x5) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdMo=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@md5={0x1, "224ebc5b3218f0e11fa3c6d613e5e3a3"}, 0x11, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1909.899869] 9p: Unknown access argument Ày: -22 [ 1909.902470] loop6: detected capacity change from 0 to 256 [ 1909.906199] loop5: detected capacity change from 0 to 163840 [ 1909.931632] 9pnet_fd: Insufficient options for proto=fd [ 1909.945425] loop7: detected capacity change from 0 to 256 [ 1909.958168] 9p: Unknown access argument Ày: -22 09:14:07 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1909.980133] 9pnet_fd: Insufficient options for proto=fd 09:14:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x9, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:14:07 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x1100, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1910.004803] FAULT_INJECTION: forcing a failure. [ 1910.004803] name failslab, interval 1, probability 0, space 0, times 0 [ 1910.006657] CPU: 0 PID: 10484 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1910.007666] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1910.008676] Call Trace: [ 1910.009005] [ 1910.009309] dump_stack_lvl+0xc1/0xf0 [ 1910.009822] should_fail_ex+0x4b4/0x5b0 [ 1910.010360] should_failslab+0x9/0x20 [ 1910.010866] kmem_cache_alloc_lru+0x6b/0x600 [ 1910.011446] ? __d_alloc+0x31/0x9c0 [ 1910.011934] __d_alloc+0x31/0x9c0 [ 1910.012406] ? __lock_acquire+0x19b1/0x6340 [ 1910.012968] d_alloc_parallel+0x10e/0x1640 [ 1910.013542] ? __pfx___lock_acquire+0x10/0x10 [ 1910.014125] ? __pfx_d_alloc_parallel+0x10/0x10 [ 1910.014733] ? lockdep_init_map_type+0x21e/0x7e0 [ 1910.015337] ? lockdep_init_map_type+0x21e/0x7e0 [ 1910.015956] __lookup_slow+0x193/0x470 [ 1910.016498] ? __pfx___lookup_slow+0x10/0x10 [ 1910.017118] ? lookup_fast+0x14e/0x530 [ 1910.017636] walk_component+0x345/0x5b0 [ 1910.018157] path_lookupat+0x1ba/0x850 [ 1910.018671] filename_lookup+0x1d2/0x590 [ 1910.019209] ? __pfx_filename_lookup+0x10/0x10 [ 1910.019816] ? find_held_lock+0x2c/0x110 [ 1910.020342] ? __might_fault+0xe2/0x190 [ 1910.020868] ? lock_release+0x1e3/0x680 [ 1910.021399] ? __virt_addr_valid+0x102/0x340 [ 1910.021980] vfs_statx+0x14c/0x430 [ 1910.022462] ? __pfx_vfs_statx+0x10/0x10 [ 1910.022992] ? getname_flags.part.0+0x1dd/0x4f0 [ 1910.023609] vfs_fstatat+0x90/0xb0 [ 1910.024089] __do_sys_newstat+0x81/0x100 [ 1910.024642] ? __pfx___do_sys_newstat+0x10/0x10 [ 1910.025254] ? perf_trace_preemptirq_template+0x252/0x420 [ 1910.025968] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1910.026718] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1910.027471] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1910.028128] ? syscall_enter_from_user_mode+0x21/0x50 [ 1910.028809] do_syscall_64+0x3f/0x90 [ 1910.029302] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1910.029971] RIP: 0033:0x7f2fa4221b16 [ 1910.030442] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1910.032623] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1910.033559] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1910.034431] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1910.035315] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1910.036190] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000004 [ 1910.037076] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1910.037976] 09:14:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x500, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:14:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x600000000000000}, {0x0, 0x0, 0x10000}]) 09:14:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5110000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:14:07 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(r0, &(0x7f0000000280)=""/163, 0xa3, 0x1) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='=\x00'/15, @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) r4 = dup(r3) symlinkat(&(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000100)='./file0\x00') [ 1910.089052] loop6: detected capacity change from 0 to 256 [ 1910.125669] loop6: detected capacity change from 0 to 256 [ 1910.167358] loop5: detected capacity change from 0 to 166016 [ 1910.187501] 9p: Unknown access argument Ày: -22 09:14:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x700000000000000}, {0x0, 0x0, 0x10000}]) 09:14:07 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xbeb00100, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:14:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x600, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1910.255789] 9p: Unknown access argument Ày: -22 09:14:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:14:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x1129, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:14:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:14:20 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:14:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x10, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:14:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x1800000000000000}, {0x0, 0x0, 0x10000}]) 09:14:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x700, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:14:20 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 78) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1922.471112] loop5: detected capacity change from 0 to 196608 [ 1922.476393] loop7: detected capacity change from 0 to 256 [ 1922.479895] loop6: detected capacity change from 0 to 256 [ 1922.487932] FAULT_INJECTION: forcing a failure. [ 1922.487932] name failslab, interval 1, probability 0, space 0, times 0 [ 1922.488756] CPU: 1 PID: 10538 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1922.489295] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1922.489834] Call Trace: [ 1922.490015] [ 1922.490177] dump_stack_lvl+0xc1/0xf0 [ 1922.490454] should_fail_ex+0x4b4/0x5b0 [ 1922.490749] should_failslab+0x9/0x20 [ 1922.491027] kmem_cache_alloc_lru+0x6b/0x600 [ 1922.491341] ? __d_alloc+0x31/0x9c0 [ 1922.491607] __d_alloc+0x31/0x9c0 [ 1922.491855] ? __lock_acquire+0x19b1/0x6340 [ 1922.492161] d_alloc_parallel+0x10e/0x1640 [ 1922.492466] ? __pfx___lock_acquire+0x10/0x10 [ 1922.492785] ? __pfx_d_alloc_parallel+0x10/0x10 [ 1922.493111] ? lockdep_init_map_type+0x21e/0x7e0 [ 1922.493443] ? lockdep_init_map_type+0x21e/0x7e0 [ 1922.493786] __lookup_slow+0x193/0x470 [ 1922.494077] ? __pfx___lookup_slow+0x10/0x10 [ 1922.494407] ? lookup_fast+0x14e/0x530 [ 1922.494678] walk_component+0x345/0x5b0 [ 1922.494957] path_lookupat+0x1ba/0x850 [ 1922.495237] filename_lookup+0x1d2/0x590 [ 1922.495521] ? __pfx_filename_lookup+0x10/0x10 [ 1922.495844] ? find_held_lock+0x2c/0x110 [ 1922.496133] ? __might_fault+0xe2/0x190 [ 1922.496412] ? lock_release+0x1e3/0x680 [ 1922.496696] ? __virt_addr_valid+0x102/0x340 [ 1922.497006] vfs_statx+0x14c/0x430 [ 1922.497266] ? __pfx_vfs_statx+0x10/0x10 [ 1922.497545] ? getname_flags.part.0+0x1dd/0x4f0 [ 1922.497879] ? putname+0x102/0x140 [ 1922.498153] vfs_fstatat+0x90/0xb0 [ 1922.498427] __do_sys_newstat+0x81/0x100 [ 1922.498729] ? __pfx___do_sys_newstat+0x10/0x10 [ 1922.499077] ? perf_trace_preemptirq_template+0x252/0x420 [ 1922.499475] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1922.499888] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1922.500312] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1922.500654] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1922.501029] ? syscall_enter_from_user_mode+0x21/0x50 [ 1922.501407] do_syscall_64+0x3f/0x90 [ 1922.501691] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1922.502053] RIP: 0033:0x7f2fa4221b16 [ 1922.502319] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1922.503577] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1922.504109] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1922.504610] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1922.505104] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1922.505604] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000005 [ 1922.506106] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1922.506613] 09:14:20 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xf0ffffff, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1922.517021] 9p: Unknown access argument À: -22 [ 1922.518121] 9p: Unknown access argument Ày: -22 [ 1922.541412] loop6: detected capacity change from 0 to 256 [ 1922.548272] 9p: Unknown access argument Ày: -22 09:14:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x1c00000000000000}, {0x0, 0x0, 0x10000}]) 09:14:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x243, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:14:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:14:20 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 79) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:14:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000140)={@local, 0x5d, r3}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup(r4) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) recvmsg$unix(r5, &(0x7f00000009c0)={&(0x7f0000000300), 0x6e, &(0x7f0000000900)=[{&(0x7f0000000580)=""/78, 0x4e}, {&(0x7f0000000600)=""/200, 0xc8}, {&(0x7f0000000700)=""/238, 0xee}, {&(0x7f0000000800)=""/197, 0xc5}], 0x4, &(0x7f0000000940)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x70}, 0x2000) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000a80)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000b80)=0xe8) setresuid(r9, r10, r6) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280), 0x2004004, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '\x00'}}, {@mmap}, {@uname={'uname', 0x3d, '9p\x00'}}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@privport}, {@cachetag={'cachetag', 0x3d, '\x00'}}, {@version_9p2000}, {@nodevmap}, {@version_u}], [{@fsname={'fsname', 0x3d, '%&'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x19}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', r9}}, {@dont_appraise}, {@obj_type={'obj_type', 0x3d, '9p\x00'}}]}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:14:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x900, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:14:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x1200, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1922.626730] loop5: detected capacity change from 0 to 229376 [ 1922.636065] loop7: detected capacity change from 0 to 256 [ 1922.641193] FAULT_INJECTION: forcing a failure. [ 1922.641193] name failslab, interval 1, probability 0, space 0, times 0 [ 1922.642053] CPU: 1 PID: 10562 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1922.642615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1922.643186] Call Trace: [ 1922.643372] [ 1922.643536] dump_stack_lvl+0xc1/0xf0 [ 1922.643827] should_fail_ex+0x4b4/0x5b0 [ 1922.644128] should_failslab+0x9/0x20 [ 1922.644407] kmem_cache_alloc_lru+0x6b/0x600 [ 1922.644715] ? __d_alloc+0x31/0x9c0 [ 1922.644990] __d_alloc+0x31/0x9c0 [ 1922.645246] ? __lock_acquire+0x19b1/0x6340 [ 1922.645555] d_alloc_parallel+0x10e/0x1640 [ 1922.645872] ? __pfx___lock_acquire+0x10/0x10 [ 1922.646202] ? __pfx_d_alloc_parallel+0x10/0x10 [ 1922.646539] ? lockdep_init_map_type+0x21e/0x7e0 [ 1922.646881] ? lockdep_init_map_type+0x21e/0x7e0 [ 1922.647227] __lookup_slow+0x193/0x470 [ 1922.647516] ? __pfx___lookup_slow+0x10/0x10 [ 1922.647846] ? lookup_fast+0x14e/0x530 [ 1922.648128] walk_component+0x345/0x5b0 [ 1922.648399] path_lookupat+0x1ba/0x850 [ 1922.648697] filename_lookup+0x1d2/0x590 [ 1922.648991] ? __pfx_filename_lookup+0x10/0x10 [ 1922.649326] ? find_held_lock+0x2c/0x110 [ 1922.649623] ? __might_fault+0xe2/0x190 [ 1922.649910] ? lock_release+0x1e3/0x680 [ 1922.650201] ? __virt_addr_valid+0x102/0x340 [ 1922.650525] vfs_statx+0x14c/0x430 [ 1922.650796] ? __pfx_vfs_statx+0x10/0x10 [ 1922.651072] ? getname_flags.part.0+0x1dd/0x4f0 [ 1922.651410] ? putname+0x102/0x140 [ 1922.651682] vfs_fstatat+0x90/0xb0 [ 1922.651951] __do_sys_newstat+0x81/0x100 [ 1922.652255] ? __pfx___do_sys_newstat+0x10/0x10 [ 1922.652603] ? perf_trace_preemptirq_template+0x252/0x420 [ 1922.653000] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1922.653416] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1922.653837] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1922.654158] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1922.654528] ? syscall_enter_from_user_mode+0x21/0x50 [ 1922.654903] do_syscall_64+0x3f/0x90 [ 1922.655187] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1922.655566] RIP: 0033:0x7f2fa4221b16 [ 1922.655829] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1922.657021] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1922.657548] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1922.658043] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1922.658533] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1922.659027] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000005 [ 1922.659511] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1922.660017] 09:14:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x4000010000000000}, {0x0, 0x0, 0x10000}]) [ 1922.667678] 9p: Unknown access argument Ày: -22 [ 1922.671622] 9p: Unknown access argument Àile0: -22 [ 1922.699670] 9p: Unknown access argument Àile0: -22 [ 1922.712708] loop6: detected capacity change from 0 to 256 [ 1922.714615] 9p: Unknown access argument Ày: -22 [ 1922.740782] loop6: detected capacity change from 0 to 256 09:14:34 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x2000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:14:34 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:14:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x6500000000000000}, {0x0, 0x0, 0x10000}]) 09:14:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x1020, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:14:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:14:34 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 80) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:14:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x300, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:14:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766066e6f3d", @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000002880), 0x4000101, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = dup(r5) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000062c40)={0x27fa9c06, [], 0x20, "7ed12cd5ca5f64"}) sendmmsg$inet6(r6, &(0x7f0000002880), 0x4000101, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000440)={0x0, 0x0, 0x5, 0x1}) ioctl$BTRFS_IOC_RESIZE(r4, 0x50009403, &(0x7f0000000100)={{r6}, {@val={r7}, @actul_num={@val=0x2b, 0x400, 0x6b}}}) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000080)) 09:14:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x1931, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1936.675363] 9pnet_fd: Insufficient options for proto=fd [ 1936.680063] 9p: Unknown access argument Ày: -22 [ 1936.705060] loop5: detected capacity change from 0 to 262144 [ 1936.707596] 9p: Unknown access argument Ày: -22 [ 1936.708623] loop7: detected capacity change from 0 to 256 09:14:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x700, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1936.728225] FAULT_INJECTION: forcing a failure. [ 1936.728225] name failslab, interval 1, probability 0, space 0, times 0 [ 1936.729862] CPU: 1 PID: 10599 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1936.731044] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1936.732211] Call Trace: [ 1936.732604] [ 1936.732960] dump_stack_lvl+0xc1/0xf0 [ 1936.733556] should_fail_ex+0x4b4/0x5b0 [ 1936.734179] ? getname_flags.part.0+0x50/0x4f0 [ 1936.734864] should_failslab+0x9/0x20 [ 1936.735448] kmem_cache_alloc+0x5a/0x390 [ 1936.736069] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1936.736865] getname_flags.part.0+0x50/0x4f0 [ 1936.737535] ? putname+0x102/0x140 [ 1936.738096] getname_flags+0x9e/0xf0 [ 1936.738672] vfs_fstatat+0x77/0xb0 [ 1936.739227] __do_sys_newstat+0x81/0x100 [ 1936.739861] ? __pfx___do_sys_newstat+0x10/0x10 [ 1936.740585] ? perf_trace_preemptirq_template+0x252/0x420 [ 1936.741437] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1936.742333] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1936.743233] ? __do_softirq+0x6d4/0x7d4 [ 1936.743844] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1936.744633] ? syscall_enter_from_user_mode+0x21/0x50 [ 1936.745434] do_syscall_64+0x3f/0x90 [ 1936.746029] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1936.746827] RIP: 0033:0x7f2fa4221b16 [ 1936.747385] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1936.749935] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1936.751036] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1936.752073] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1936.753115] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1936.754148] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000006 [ 1936.755175] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1936.756232] 09:14:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x2000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:14:34 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:14:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x9000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:14:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x8004000000000000}, {0x0, 0x0, 0x10000}]) [ 1936.796483] loop6: detected capacity change from 0 to 256 [ 1936.864811] loop6: detected capacity change from 0 to 256 09:14:34 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 81) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:14:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x2010, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1936.892430] loop5: detected capacity change from 0 to 264192 [ 1936.931255] 9p: Unknown access argument Ày: -22 [ 1936.982896] loop7: detected capacity change from 0 to 256 [ 1936.987589] 9p: Unknown access argument Ày: -22 09:14:34 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x2902, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:14:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x8cffffff00000000}, {0x0, 0x0, 0x10000}]) 09:14:34 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:14:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x3119, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:14:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:14:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x900, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:14:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xeffdffffffffffff}, {0x0, 0x0, 0x10000}]) [ 1937.107986] loop6: detected capacity change from 0 to 256 [ 1937.138499] 9p: Unknown access argument Ày: -22 [ 1937.151422] loop6: detected capacity change from 0 to 256 [ 1937.165286] 9p: Unknown access argument Ày: -22 [ 1937.367516] 9pnet_fd: Insufficient options for proto=fd [ 1950.774972] loop5: detected capacity change from 0 to 264192 [ 1950.796888] loop6: detected capacity change from 0 to 256 [ 1950.808164] loop7: detected capacity change from 0 to 256 09:14:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xf6ffffff00000000}, {0x0, 0x0, 0x10000}]) 09:14:48 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xff030000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:14:48 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 82) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:14:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xc070000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:14:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x3f00, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:14:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x1020, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:14:48 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x2911, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:14:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)={0x13, 0x65, 0xffff, 0x168, 0x6, '9P2000'}, 0x13) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x5a, &(0x7f0000000080)={@link_local, @dev, @val={@void}, {@canfd={0x8100, {{}, 0x0, 0x0, 0x0, 0x0, "bf5ec5abb92316ffad4769f3a3cc0d360e7fbd8096835ae1c03e90cbae66998d397b9a99fd7fd97e53c3f42512daeaac857bda4c34595fb82dbb72348507f1de"}}}}, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x80, 0xeb, 0x3, 0x2, 0x11, 0x0, 0x5, 0x2004a, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000080)}, 0x1002, 0x9f29, 0xa5ee, 0x70b8075f8bd265b3, 0x1, 0x10001, 0xbf, 0x0, 0x7f, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@noextend}], [{@subj_user={'subj_user', 0x3d, '9P2000'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@uid_gt={'uid>', r2}}, {@fowner_lt={'fowner<', r3}}]}}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3d4395da5d2632aa1535f585b86fdd0326e98f7861c790458100182795438dfdfc31d6c3f73ad717d3a3c4e7c7a7a18816c4d4566da45e2169f91ed5e71b317d0ae33e24d2f6effc68a02f02ff", @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1950.813372] FAULT_INJECTION: forcing a failure. [ 1950.813372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1950.814220] CPU: 1 PID: 10670 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1950.814758] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1950.815339] Call Trace: [ 1950.815521] [ 1950.815680] dump_stack_lvl+0xc1/0xf0 [ 1950.815962] should_fail_ex+0x4b4/0x5b0 [ 1950.816247] strncpy_from_user+0x38/0x340 [ 1950.816538] getname_flags.part.0+0x95/0x4f0 [ 1950.816852] ? putname+0x102/0x140 [ 1950.817120] getname_flags+0x9e/0xf0 [ 1950.817388] vfs_fstatat+0x77/0xb0 [ 1950.817656] __do_sys_newstat+0x81/0x100 [ 1950.817954] ? __pfx___do_sys_newstat+0x10/0x10 [ 1950.818316] ? perf_trace_preemptirq_template+0x252/0x420 [ 1950.818693] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1950.819116] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1950.819532] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1950.819852] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1950.820228] ? syscall_enter_from_user_mode+0x21/0x50 [ 1950.820602] do_syscall_64+0x3f/0x90 [ 1950.820892] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1950.821275] RIP: 0033:0x7f2fa4221b16 [ 1950.821538] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1950.822781] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1950.823317] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1950.823810] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1950.824301] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1950.824808] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000006 [ 1950.825310] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1950.825818] 09:14:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x2000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:14:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xd000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1950.848937] 9pnet_fd: Insufficient options for proto=fd [ 1950.853065] loop6: detected capacity change from 0 to 256 09:14:48 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xffff1f00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1950.865497] loop5: detected capacity change from 0 to 264192 09:15:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x4, 0x2}}, 0x14) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfcfdffff00000000}, {0x0, 0x0, 0x10000}]) 09:15:00 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:15:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x2010, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:00 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x2e02, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:15:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:00 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 83) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:15:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x4800, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 1962.597750] loop7: detected capacity change from 0 to 256 [ 1962.617107] loop5: detected capacity change from 0 to 264192 09:15:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfeffffff00000000}, {0x0, 0x0, 0x10000}]) 09:15:00 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 84) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1962.663877] loop6: detected capacity change from 0 to 256 [ 1962.706401] loop7: detected capacity change from 0 to 256 [ 1962.731675] FAULT_INJECTION: forcing a failure. [ 1962.731675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1962.733385] CPU: 0 PID: 10718 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1962.733981] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1962.734542] Call Trace: [ 1962.734735] [ 1962.734904] dump_stack_lvl+0xc1/0xf0 [ 1962.735204] should_fail_ex+0x4b4/0x5b0 [ 1962.735509] strncpy_from_user+0x38/0x340 [ 1962.735828] getname_flags.part.0+0x95/0x4f0 [ 1962.736164] ? putname+0x102/0x140 [ 1962.736436] getname_flags+0x9e/0xf0 [ 1962.736714] vfs_fstatat+0x77/0xb0 [ 1962.736990] __do_sys_newstat+0x81/0x100 [ 1962.737305] ? __pfx___do_sys_newstat+0x10/0x10 [ 1962.737653] ? perf_trace_preemptirq_template+0x252/0x420 [ 1962.738060] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1962.738486] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1962.738923] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1962.739303] ? syscall_enter_from_user_mode+0x21/0x50 [ 1962.739688] do_syscall_64+0x3f/0x90 [ 1962.739974] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1962.740363] RIP: 0033:0x7f2fa4221b16 [ 1962.740640] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1962.741910] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1962.742450] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1962.742953] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1962.743459] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1962.743956] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000006 [ 1962.744461] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1962.744974] [ 1962.752653] loop6: detected capacity change from 0 to 256 09:15:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x3e02, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:15:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x10000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfeffffffffffffff}, {0x0, 0x0, 0x10000}]) 09:15:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1974.771477] loop5: detected capacity change from 0 to 264192 09:15:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x358d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) acct(0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x9, 0x40) setsockopt$inet6_udp_int(r3, 0x11, 0x65, &(0x7f0000000100)=0x6, 0x4) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa428}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = fsmount(r3, 0x1, 0x84) fcntl$dupfd(r4, 0x406, r2) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x4c00, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:15:12 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 85) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1974.782146] loop6: detected capacity change from 0 to 256 [ 1974.804328] loop7: detected capacity change from 0 to 256 09:15:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x368d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1974.821689] loop6: detected capacity change from 0 to 256 09:15:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x11000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 1974.845288] 9p: Unknown access argument À: -22 [ 1974.873788] loop5: detected capacity change from 0 to 264192 09:15:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xffffffff00000000}, {0x0, 0x0, 0x10000}]) [ 1974.899536] 9p: Unknown access argument À: -22 09:15:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x4faa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:15:12 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 86) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:15:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x12000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xfffffff0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:15:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x378d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x3f00, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1974.979629] loop5: detected capacity change from 0 to 264192 [ 1974.994678] loop6: detected capacity change from 0 to 256 [ 1975.032775] loop6: detected capacity change from 0 to 256 09:15:12 executing program 1: r0 = geteuid() mount$9p_fd(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f0000000280), 0x800000, &(0x7f0000000440)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@fscache}, {@version_L}, {@version_L}, {@debug={'debug', 0x3d, 0xfffffffffffffffd}}], [{@appraise_type}, {@smackfsfloor}, {@uid_eq={'uid', 0x3d, r0}}]}}) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r3) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r5) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)=[{&(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x668}], 0x1, &(0x7f0000000b40)=[@cred={{0x1c, 0x1, 0x2, {0x0, r0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, 0xee00}}}, @rights={{0x34, 0x1, 0x1, [r1, r3, r4, r1, r1, r1, r1, r5, r1]}}], 0xb8, 0x10008095}, 0x6008080) stat(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000100)) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1975.045802] loop7: detected capacity change from 0 to 256 09:15:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x20000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1975.097605] loop5: detected capacity change from 0 to 264192 [ 1975.109935] 9p: Unknown access argument Àile0: -22 09:15:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:25 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:15:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfffffffffffff000}, {0x0, 0x0, 0x10000}]) 09:15:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x50aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:15:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x4800, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:15:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x388d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:25 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 87) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 1987.779429] loop5: detected capacity change from 0 to 264192 [ 1987.792670] loop6: detected capacity change from 0 to 256 [ 1987.807495] 9p: Unknown access argument À: -22 [ 1987.823488] loop7: detected capacity change from 0 to 256 [ 1987.835140] FAULT_INJECTION: forcing a failure. [ 1987.835140] name failslab, interval 1, probability 0, space 0, times 0 [ 1987.836604] CPU: 1 PID: 10808 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 1987.837627] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1987.838620] Call Trace: [ 1987.838957] [ 1987.839255] dump_stack_lvl+0xc1/0xf0 [ 1987.839771] should_fail_ex+0x4b4/0x5b0 [ 1987.840311] ? getname_flags.part.0+0x50/0x4f0 [ 1987.840902] should_failslab+0x9/0x20 [ 1987.841410] kmem_cache_alloc+0x5a/0x390 [ 1987.841942] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1987.842611] getname_flags.part.0+0x50/0x4f0 [ 1987.843182] ? putname+0x102/0x140 [ 1987.843654] getname_flags+0x9e/0xf0 [ 1987.844136] vfs_fstatat+0x77/0xb0 [ 1987.844613] __do_sys_newstat+0x81/0x100 [ 1987.845138] ? __pfx___do_sys_newstat+0x10/0x10 [ 1987.845761] ? perf_trace_preemptirq_template+0x252/0x420 [ 1987.846467] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1987.847202] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1987.847945] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1987.848508] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1987.849160] ? syscall_enter_from_user_mode+0x21/0x50 [ 1987.849829] do_syscall_64+0x3f/0x90 [ 1987.850325] 9p: Unknown access argument À: -22 [ 1987.850321] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1987.851304] RIP: 0033:0x7f2fa4221b16 [ 1987.851776] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 1987.853960] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1987.854883] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 1987.855745] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 1987.856611] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 1987.857495] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000007 [ 1987.858361] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 1987.859247] 09:15:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x40000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfffffffffffffdef}, {0x0, 0x0, 0x10000}]) [ 1987.875589] loop6: detected capacity change from 0 to 256 09:15:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3d1bd56c4c82a1a8ba75fa2c8ffd6eff845c239733f7d55ec885b01aac7b8e0a110d7e53385e06f22c0f098cfd2953362c383ed710d2c9641d4efb3e209a99474e6f238d0132a6b262ca0375ea221616fcdce25d4e76a942c7627171225575e2f851894a80a924d793ecc0e1b9b9e98c27", @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x398d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1987.912286] loop5: detected capacity change from 0 to 264192 09:15:25 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:15:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x4c00, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:15:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x51aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:15:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x46af0100, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 1987.991536] 9pnet_fd: Insufficient options for proto=fd [ 1988.010133] 9pnet_fd: Insufficient options for proto=fd [ 1988.015447] loop6: detected capacity change from 0 to 256 [ 1988.027963] loop5: detected capacity change from 0 to 264192 [ 1988.052323] loop6: detected capacity change from 0 to 256 09:15:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x4, 0x27, 0x40, 0x0, 0x0, 0x4, 0x500, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000080)}, 0x10031, 0x1, 0x1, 0x3, 0xfffffffffffffc01, 0x5, 0x401, 0x0, 0x800, 0x0, 0x2}, r3, 0x2, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 1988.169902] 9p: Unknown access argument À: -22 [ 1988.183290] 9p: Unknown access argument À: -22 09:15:38 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 88) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:15:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x48000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x10000}]) 09:15:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3a8d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x52aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:15:38 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:15:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x5500, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2000.479946] loop7: detected capacity change from 0 to 256 [ 2000.480851] loop6: detected capacity change from 0 to 256 [ 2000.500533] loop5: detected capacity change from 0 to 264192 [ 2000.510847] loop6: detected capacity change from 0 to 256 [ 2000.569289] 9p: Unknown access argument À: -22 [ 2000.588029] 9p: Unknown access argument À: -22 09:15:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) write$9p(r1, &(0x7f0000000100)="33a1cc348cacf9d3d5463e99bc36304a962cc7c95dfc753453a5bb33ad5a730286d4be66c8a7affa4e0b47ec5c46e6a04824960a948144568e137fb00a7563a0d0e1a5179691e5447939a3bfb3328e1f7177fdeb8a228c354f032cae86955778051908385e1ecd49a96c730e6d93b02d30059f478cef478c929681928007f78086a57622986b", 0x86) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x2, 0x440) 09:15:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x10000}]) 09:15:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x53aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:15:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4c000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:53 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 89) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:15:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3b8d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:15:53 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x6800, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:15:53 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2015.563612] loop7: detected capacity change from 0 to 256 [ 2015.567506] loop5: detected capacity change from 0 to 264192 [ 2015.567588] loop6: detected capacity change from 0 to 256 09:15:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x54aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2015.577899] FAULT_INJECTION: forcing a failure. [ 2015.577899] name failslab, interval 1, probability 0, space 0, times 0 [ 2015.578638] CPU: 1 PID: 10893 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 2015.579156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2015.579666] Call Trace: [ 2015.579838] [ 2015.579992] dump_stack_lvl+0xc1/0xf0 [ 2015.580270] should_fail_ex+0x4b4/0x5b0 [ 2015.580552] should_failslab+0x9/0x20 [ 2015.580812] kmem_cache_alloc_lru+0x6b/0x600 [ 2015.581107] ? __d_alloc+0x31/0x9c0 [ 2015.581360] __d_alloc+0x31/0x9c0 [ 2015.581598] ? __lock_acquire+0x19b1/0x6340 [ 2015.581902] d_alloc_parallel+0x10e/0x1640 [ 2015.582204] ? __pfx___lock_acquire+0x10/0x10 [ 2015.582505] ? __pfx_d_alloc_parallel+0x10/0x10 [ 2015.582821] ? lockdep_init_map_type+0x21e/0x7e0 [ 2015.583147] ? lockdep_init_map_type+0x21e/0x7e0 [ 2015.583475] __lookup_slow+0x193/0x470 [ 2015.583751] ? __pfx___lookup_slow+0x10/0x10 [ 2015.584071] ? lookup_fast+0x14e/0x530 [ 2015.584332] walk_component+0x345/0x5b0 [ 2015.584605] path_lookupat+0x1ba/0x850 [ 2015.584872] filename_lookup+0x1d2/0x590 [ 2015.585152] ? __pfx_filename_lookup+0x10/0x10 [ 2015.585466] ? find_held_lock+0x2c/0x110 [ 2015.585751] ? __might_fault+0xe2/0x190 [ 2015.586018] ? lock_release+0x1e3/0x680 [ 2015.586292] ? __virt_addr_valid+0x102/0x340 [ 2015.586593] vfs_statx+0x14c/0x430 [ 2015.586842] ? __pfx_vfs_statx+0x10/0x10 [ 2015.587114] ? getname_flags.part.0+0x1dd/0x4f0 [ 2015.587426] ? putname+0x102/0x140 [ 2015.587678] vfs_fstatat+0x90/0xb0 [ 2015.587926] __do_sys_newstat+0x81/0x100 [ 2015.588199] ? __pfx___do_sys_newstat+0x10/0x10 [ 2015.588508] ? perf_trace_preemptirq_template+0x252/0x420 [ 2015.588885] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2015.589271] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2015.589663] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2015.589981] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2015.590321] ? syscall_enter_from_user_mode+0x21/0x50 [ 2015.590665] do_syscall_64+0x3f/0x90 [ 2015.590925] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2015.591270] RIP: 0033:0x7f2fa4221b16 [ 2015.591514] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2015.592628] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2015.593104] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 2015.593548] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 2015.594003] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 2015.594447] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000006 [ 2015.594905] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 2015.595363] 09:15:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x2}, {0x0, 0x0, 0x10000}]) 09:15:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x55000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2015.635871] loop6: detected capacity change from 0 to 256 09:15:53 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:15:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3c8d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2015.673534] loop5: detected capacity change from 0 to 264192 09:15:53 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x6c00, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:15:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x55aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:15:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x3}, {0x0, 0x0, 0x10000}]) 09:15:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x55aaffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:53 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 90) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2015.760872] loop6: detected capacity change from 0 to 256 [ 2015.783012] loop5: detected capacity change from 0 to 264192 [ 2015.783998] loop7: detected capacity change from 0 to 256 09:15:53 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:15:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x56aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:15:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3d8d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2015.826599] loop6: detected capacity change from 0 to 256 [ 2015.827011] 9p: Unknown access argument À: -22 09:15:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x10000}]) 09:15:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x62ef52ae, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:15:53 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 91) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:15:53 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2015.892864] loop5: detected capacity change from 0 to 264192 [ 2015.901469] loop7: detected capacity change from 0 to 256 [ 2015.916090] FAULT_INJECTION: forcing a failure. [ 2015.916090] name failslab, interval 1, probability 0, space 0, times 0 [ 2015.916803] CPU: 1 PID: 10951 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 2015.917312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2015.917832] Call Trace: [ 2015.918009] [ 2015.918163] dump_stack_lvl+0xc1/0xf0 [ 2015.918438] should_fail_ex+0x4b4/0x5b0 [ 2015.918724] should_failslab+0x9/0x20 [ 2015.918995] __kmem_cache_alloc_node+0x5b/0x310 [ 2015.919320] ? kobject_uevent_env+0x21e/0xf80 [ 2015.919622] ? __pfx_dev_uevent_name+0x10/0x10 [ 2015.919936] kmalloc_trace+0x26/0xc0 [ 2015.920190] ? __pfx_dev_uevent_name+0x10/0x10 [ 2015.920495] kobject_uevent_env+0x21e/0xf80 [ 2015.920782] ? kernfs_put+0x46/0x50 [ 2015.921041] __loop_clr_fd+0x2fa/0x900 [ 2015.921317] lo_ioctl+0x634/0x1990 [ 2015.921559] ? do_syscall_64+0x3f/0x90 [ 2015.921838] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2015.922201] ? __pfx_lo_ioctl+0x10/0x10 [ 2015.922459] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2015.922805] ? __pfx_perf_tp_event+0x10/0x10 [ 2015.923104] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 2015.923431] ? __lock_acquire+0xc3f/0x6340 [ 2015.923719] ? __pfx_lock_release+0x10/0x10 [ 2015.924012] ? perf_trace_lock+0xc1/0x480 [ 2015.924291] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2015.924636] ? do_vfs_ioctl+0x132/0x1690 [ 2015.924916] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2015.925258] ? blkdev_common_ioctl+0x19e/0x1950 [ 2015.925568] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 2015.925968] ? __pfx_blkdev_common_ioctl+0x10/0x10 [ 2015.926294] ? __destroy_inode+0x62c/0x750 [ 2015.926572] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 2015.926967] ? __pfx_lock_release+0x10/0x10 [ 2015.927253] ? perf_trace_preemptirq_template+0x252/0x420 [ 2015.927621] ? __pfx_lo_ioctl+0x10/0x10 [ 2015.927884] blkdev_ioctl+0x35e/0x7e0 [ 2015.928145] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2015.928438] ? selinux_file_ioctl+0xba/0x270 [ 2015.928741] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2015.929032] __x64_sys_ioctl+0x19e/0x210 [ 2015.929314] do_syscall_64+0x3f/0x90 [ 2015.929575] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2015.929927] RIP: 0033:0x7f2fa42228d7 [ 2015.930170] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2015.931280] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2015.931753] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa42228d7 [ 2015.932205] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000008 [ 2015.932653] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 2015.933100] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000008 [ 2015.933548] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 2015.934027] 09:16:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:16:07 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x7400, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2029.294601] loop6: detected capacity change from 0 to 256 09:16:07 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 92) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:16:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x10000}]) 09:16:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3e8d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:16:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x57aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:16:07 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:16:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x68000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2029.324726] loop6: detected capacity change from 0 to 256 [ 2029.327791] loop5: detected capacity change from 0 to 264192 [ 2029.358578] loop7: detected capacity change from 0 to 256 [ 2029.399577] 9p: Unknown access argument À: -22 [ 2029.416761] FAULT_INJECTION: forcing a failure. [ 2029.416761] name failslab, interval 1, probability 0, space 0, times 0 [ 2029.419526] CPU: 0 PID: 10971 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 2029.420622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2029.421693] Call Trace: [ 2029.422067] [ 2029.422391] dump_stack_lvl+0xc1/0xf0 [ 2029.422940] should_fail_ex+0x4b4/0x5b0 [ 2029.423516] should_failslab+0x9/0x20 [ 2029.424054] kmem_cache_alloc_lru+0x6b/0x600 [ 2029.424669] ? __d_alloc+0x31/0x9c0 [ 2029.425194] __d_alloc+0x31/0x9c0 [ 2029.425706] ? __lock_acquire+0x19b1/0x6340 [ 2029.426337] d_alloc_parallel+0x10e/0x1640 [ 2029.427092] ? __pfx___lock_acquire+0x10/0x10 [ 2029.427928] ? __pfx_d_alloc_parallel+0x10/0x10 [ 2029.428809] ? lockdep_init_map_type+0x21e/0x7e0 [ 2029.429679] ? lockdep_init_map_type+0x21e/0x7e0 [ 2029.430610] __lookup_slow+0x193/0x470 [ 2029.431308] ? __pfx___lookup_slow+0x10/0x10 [ 2029.432010] ? lookup_fast+0x14e/0x530 [ 2029.432591] walk_component+0x345/0x5b0 [ 2029.433147] path_lookupat+0x1ba/0x850 [ 2029.433749] filename_lookup+0x1d2/0x590 [ 2029.434360] ? __pfx_filename_lookup+0x10/0x10 [ 2029.435061] ? find_held_lock+0x2c/0x110 [ 2029.435697] ? __might_fault+0xe2/0x190 [ 2029.436269] ? lock_release+0x1e3/0x680 [ 2029.436860] ? __virt_addr_valid+0x102/0x340 [ 2029.437504] vfs_statx+0x14c/0x430 [ 2029.438041] ? __pfx_vfs_statx+0x10/0x10 [ 2029.438634] ? getname_flags.part.0+0x1dd/0x4f0 [ 2029.439306] ? putname+0x102/0x140 [ 2029.439844] vfs_fstatat+0x90/0xb0 [ 2029.440359] __do_sys_newstat+0x81/0x100 [ 2029.440946] ? __pfx___do_sys_newstat+0x10/0x10 [ 2029.441594] ? perf_trace_preemptirq_template+0x252/0x420 [ 2029.442401] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2029.443196] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2029.444024] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2029.444638] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2029.445375] ? syscall_enter_from_user_mode+0x21/0x50 [ 2029.446094] do_syscall_64+0x3f/0x90 [ 2029.446640] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2029.447374] RIP: 0033:0x7f2fa4221b16 [ 2029.447900] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2029.450315] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2029.451325] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 2029.452290] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 2029.453266] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 2029.454242] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000007 [ 2029.455202] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 2029.456193] 09:16:20 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 93) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:16:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x10000}]) 09:16:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x7a00, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:16:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363200, &(0x7f00000000c0), 0x0, 0x0, {0x2000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:16:20 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:16:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6c000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:16:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x58aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:16:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3f00, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2042.561971] loop7: detected capacity change from 0 to 256 [ 2042.572671] loop6: detected capacity change from 0 to 256 [ 2042.583170] FAULT_INJECTION: forcing a failure. [ 2042.583170] name failslab, interval 1, probability 0, space 0, times 0 [ 2042.584270] CPU: 0 PID: 10994 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 2042.584944] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2042.585638] Call Trace: [ 2042.585865] [ 2042.586078] dump_stack_lvl+0xc1/0xf0 [ 2042.586429] should_fail_ex+0x4b4/0x5b0 [ 2042.586790] should_failslab+0x9/0x20 [ 2042.587143] kmem_cache_alloc_lru+0x6b/0x600 [ 2042.587538] ? __d_alloc+0x31/0x9c0 [ 2042.587873] __d_alloc+0x31/0x9c0 [ 2042.588189] ? __lock_acquire+0x19b1/0x6340 [ 2042.588575] d_alloc_parallel+0x10e/0x1640 [ 2042.588964] ? __pfx___lock_acquire+0x10/0x10 [ 2042.589369] ? __pfx_d_alloc_parallel+0x10/0x10 [ 2042.589788] ? lockdep_init_map_type+0x21e/0x7e0 [ 2042.590224] ? lockdep_init_map_type+0x21e/0x7e0 [ 2042.590654] __lookup_slow+0x193/0x470 [ 2042.591003] ? __pfx___lookup_slow+0x10/0x10 [ 2042.591422] ? lookup_fast+0x14e/0x530 [ 2042.591764] walk_component+0x345/0x5b0 [ 2042.592110] path_lookupat+0x1ba/0x850 [ 2042.592460] filename_lookup+0x1d2/0x590 [ 2042.592823] ? __pfx_filename_lookup+0x10/0x10 [ 2042.593242] ? find_held_lock+0x2c/0x110 [ 2042.593611] ? __might_fault+0xe2/0x190 [ 2042.593968] ? lock_release+0x1e3/0x680 [ 2042.594342] ? __virt_addr_valid+0x102/0x340 [ 2042.594734] vfs_statx+0x14c/0x430 [ 2042.595062] ? __pfx_vfs_statx+0x10/0x10 [ 2042.595427] ? getname_flags.part.0+0x1dd/0x4f0 [ 2042.595843] vfs_fstatat+0x90/0xb0 [ 2042.596180] __do_sys_newstat+0x81/0x100 [ 2042.596539] ? __pfx___do_sys_newstat+0x10/0x10 [ 2042.596959] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2042.597414] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2042.597898] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2042.598300] ? __pfx___x64_sys_newstat+0x10/0x10 [ 2042.598722] do_syscall_64+0x3f/0x90 [ 2042.599011] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2042.599474] RIP: 0033:0x7f2fa4221b16 [ 2042.599754] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 2042.601262] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2042.601914] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa4221b16 [ 2042.602539] RDX: 00007f2fa1797fc0 RSI: 00007f2fa1797fc0 RDI: 00007f2fa1797f40 [ 2042.603152] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 2042.603763] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000007 [ 2042.604372] R13: 00007f2fa1797fc0 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 2042.604996] [ 2042.636206] loop6: detected capacity change from 0 to 256 [ 2042.638343] loop5: detected capacity change from 0 to 264192 09:16:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3f8d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:16:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x59aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2042.662819] 9p: Unknown access argument À: -22 09:16:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x7}, {0x0, 0x0, 0x10000}]) 09:16:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x9000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2042.710167] 9p: Unknown access argument À: -22 09:16:20 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:16:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x74000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2042.734450] loop6: detected capacity change from 0 to 256 09:16:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x5aaa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2042.760819] loop6: detected capacity change from 0 to 256 09:16:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x408d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:16:20 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 94) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:16:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x8}, {0x0, 0x0, 0x10000}]) 09:16:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @remote, @broadcast}}}], 0x20}, 0xe00) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000002080)={'ip6tnl0\x00', &(0x7f0000002000)={'syztnl2\x00', 0x0, 0x2f, 0x28, 0x9c, 0x4, 0x20, @dev={0xfe, 0x80, '\x00', 0x28}, @mcast2, 0x10, 0x48, 0x5}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000020c0)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000021c0)=0xe8) sendmmsg$inet6(r4, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)="5cfd0ec8a37e4b3f", 0x8}, {&(0x7f0000000280)="69751ba9e2e6de67ca59c7e9363ab4e721db42200a5e92956ba8081522643d9a3fe2e07974b8267c45cb0fee637acbbdd7139d1c23908b5d4872311ee653722899d0c4722644f9c257208763e7b320d6196f7f9e9a104572818ccf7bae5f84c674248cd98085be32f4194271d95993342fe1ea1bfe6f57ad0e69f3cddae28637", 0x80}, {&(0x7f0000000300)="9aa2bd47ba18a78f2afa9efcbe6ddd910fb715f3e319fee5b4e7f012249e17e6f11fd59ad46b42fb54c284c9c798301acbed6079860292ad9b9b4ef0ce24ea5c525a45e2254d40d95160cda988c660a867083c57a89a6e75a092285836b71b", 0x5f}], 0x3, &(0x7f0000000440)=[@rthdr={{0x48, 0x29, 0x39, {0x33, 0x6, 0x2, 0x2, 0x0, [@mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x40}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private2, r7}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x6e67878437201527, 0x4, 0x2, 0x5, 0x0, [@dev={0xfe, 0x80, '\x00', 0x1f}, @loopback]}}}, @hopopts_2292={{0x108, 0x29, 0x36, {0x21, 0x1e, '\x00', [@jumbo={0xc2, 0x4, 0x3}, @generic={0x81, 0x4d, "5cb4a4643fc83d6c28f65a130738575fb4ada69a048f7eaf09f6b39afe2e0829ad8e71e5bc2fe4130ca0895e1836d50b8df9cbe6a61a3dde3b3e2bb4d1114a05b5d00e7c2684ea365304155b02"}, @enc_lim={0x4, 0x1, 0x81}, @generic={0x1, 0x56, "28e704dff84f794031ecc4576d430c6ce9c138f4de835a6eaf4e05c575095ef8ca3fe8c3a8e8e15a07adab6413f85eeed978ac5408b9772552dd4f03995795db225d196a9c4ed2833991505bd00b05b923f14dc64f82"}, @jumbo={0xc2, 0x4, 0x5}, @calipso={0x7, 0x38, {0x872184653b68f3bf, 0xc, 0x1, 0xfffe, [0x8000, 0xde7, 0x2ca, 0x8, 0x10001, 0x6]}}]}}}, @dstopts={{0x118, 0x29, 0x37, {0x73, 0x1f, '\x00', [@calipso={0x7, 0x30, {0x2, 0xa, 0x81, 0x2, [0x1, 0x2, 0x967, 0xd3, 0x7]}}, @ra={0x5, 0x2, 0x401}, @ra={0x5, 0x2, 0x2d}, @ra={0x5, 0x2, 0x4}, @generic={0x1, 0xb8, "5a7bd8c8289ce9029ba65ffac14448a8f12e4d634e5963c677797dfff726027a4f7a8d29a34aa547c61839525dcb46c9c4765e85d3c9d44923d98c21a38b050968de47f275ea2d2fbd169d28e721c34ffd5a3cff9c65e47ea065ff044c0a2bfde97116163691ad0ee5e3e974cc1551d3043ae01ee743e84f5b64c3b44adcc85a31329b6aa306f4d3944a781acac5f5904b66f346b9d25de57cdd33851abd467e3bb6cbbbebc4054564dab1b1bc76c587f81e42293663eeac"}, @pad1]}}}], 0x2c8}}, {{&(0x7f0000000740)={0xa, 0x4e23, 0x5, @ipv4={'\x00', '\xff\xff', @local}, 0x3ff}, 0x1c, &(0x7f0000001a00)=[{&(0x7f0000000780)="00d11dc85b59dc1d5f4787bd625dc36d7c", 0x11}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="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", 0xfd}, {&(0x7f00000018c0)="f88ee4fbfe146a1e97e59773de4ac2a5fa6700d5fdfa1aa1d5917a3251419ccf2baa634c9ac38c18e6eed1a27dda3baecccb7d2f3bf2fc9992696218d8ec6d520ade2f27db89b86fa3318e", 0x4b}, {&(0x7f0000001940)="d743be763d611978bcf429cf49c16e6a5ba8161c4fc309edcc7539aa80083b1fdae2ff2e6ffc1e02524ca20f5efd6d1e38848915eb1967b10cfcf40d87a3ce43444ea6d94a1b55569c9386ca3c70cbde494205b0d070e80f876927fd6e70cc212a1c3c8b2eb266dda9f7795a4cf4c1715b8916434f2f978d53f5479096fc4315f65e06db15040a3246d63c12b678dd7d8d73d8532b560858283002997592b3a05a57e54b6f2c4e1c843b64395d72d2f0fda5545da050d4eb", 0xb8}], 0x5, &(0x7f0000001a80)=[@dstopts_2292={{0x138, 0x29, 0x4, {0x21, 0x23, '\x00', [@generic={0x6, 0xf3, "5fd1741daa0b9054a27d38ba806e821d51730cb3138a2f4ecfc064e2e2dbc38f6710892f0d8c240c47a2dd8118b92a1863d1330ad96e6292bc2a64219a9265bf9af83df8223c82b5dc819123244694c3c1390b1bac6d0cb6b8039d31cf81be2d085fc4483ec482ac3243c94697c7c20b9507cdebc89debee8c1c2267b6b9906b7588528b358b2208e98eaba200b7c4cf607b8d4bc4fc58effaebd9293683ac9c308f9759c15b9f41e8b588fd72533ac9c43a7a3effa60bea24e6df83013c55ca05bdeaa20ae394c4acbfc4945080e8a0130361aacf621f57512ba8ac7ae93823cf1c61d4b888b2f1f4cd022fbc3ef3f90e461f"}, @calipso={0x7, 0x28, {0x2, 0x8, 0x3f, 0xba35, [0x1, 0xa6, 0x2, 0x7]}}]}}}], 0x138}}, {{&(0x7f0000001bc0)={0xa, 0x4e23, 0x1, @rand_addr=' \x01\x00', 0x1}, 0x1c, &(0x7f0000001d80)=[{&(0x7f0000001c00)="0805b9f1ac9aee27096eeb1d01077ccd33cc3511a6ad8b4a0e6020aefc83577f8fb0d66cff27af448167201f60359852b43d6ded0adce16266eacb930dd713f63166c618003179fdc1f98289c45c9eff69e6c4b50a3ef96b4c49434071ff0fa716", 0x61}, {&(0x7f0000001c80)="6265c660cc0dbc7873b9f92fc44fb92e580105173a9c33245022d5da10a095e13582411725841b75a6866bd39877ac1dde8f733ad2f9eab34952bf12458d714e28e26a850adfeaa61d7c26dd3fd276aeac625c01fb19958a71a24bcc8bd2a0dab2ce2d80fbb59699e7eb72699313c7bd29a2283ec11bf61062bef0469331b098575e027ee21d9f28caac8002d3514e95f91454d48b43f2cc5637f5cb5792fe0cfac8d826fac74150046218e0be7ad7aaef52ee4cc75942d7f7c8c9312cb00b89a7cd66e30401e631a15b55cc9d3abc67c1a1a5e7fe01d5a33db2a9a506c7c89c3cd99c454549c68e2274e89d263f", 0xee}], 0x2, &(0x7f0000001dc0)=[@flowinfo={{0x14, 0x29, 0xb, 0x9}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8000}}, @rthdr={{0x68, 0x29, 0x39, {0x11, 0xa, 0x2, 0x2, 0x0, [@dev={0xfe, 0x80, '\x00', 0xe}, @dev={0xfe, 0x80, '\x00', 0x42}, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0={0xfc, 0x0, '\x00', 0x1}]}}}, @tclass={{0x14, 0x29, 0x43, 0x1}}, @rthdr_2292={{0x48, 0x29, 0x39, {0xc, 0x6, 0x0, 0x22, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, @mcast2]}}}, @hopopts={{0x38, 0x29, 0x36, {0x32, 0x3, '\x00', [@enc_lim={0x4, 0x1, 0x1}, @hao={0xc9, 0x10, @mcast2}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}], 0x130}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001f00)="b67d6e09d062ab26eca792b9d2a74e8908c1c3584bda677bdae89d15455c041ec612329e88c9ddafe1aca3b46eec4a3ffd81052c2af0255457a0101bb0feef95db56b605354a12a838e60a49f0bce9c4daaa4a690b80adc5fd9eae120b854a9a7f79fa85bc7591772e3cb5a65ce3410192d1722fdc966f94a9f07367398f1764383879c8", 0x84}], 0x1, &(0x7f0000002200)=[@dstopts={{0x30, 0x29, 0x37, {0x0, 0x2, '\x00', [@jumbo={0xc2, 0x4, 0x20}, @jumbo={0xc2, 0x4, 0x6}, @enc_lim, @pad1, @enc_lim={0x4, 0x1, 0xd9}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2}}, @rthdr={{0x38, 0x29, 0x39, {0x2f, 0x4, 0x1, 0x9, 0x0, [@mcast2, @rand_addr=' \x01\x00']}}}, @pktinfo={{0x24, 0x29, 0x32, {@private2, r8}}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r9}}}, @tclass={{0x14, 0x29, 0x43, 0x2}}, @tclass={{0x14, 0x29, 0x43, 0x7ff}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}], 0x130}}, {{0x0, 0x0, &(0x7f0000003580)=[{&(0x7f0000002340)="6a6a87c87c9d18234f68f5934b7f8b4a9f7037168cd6c33e85138b3beb3bee806201673d5eff7ac9cc4f5aa9946b7a8a20f2746137360842ee7d7e502112a9c8fbc83bb61678", 0x46}, {&(0x7f00000023c0)="3380242ac0b9dd6718433b826a94464d672e7a8e6f0b549ba13f0bb8b454a3bfa0b10276f3f3d58dad1c5fe561b78ee73868f0433a74aa", 0x37}, {&(0x7f0000002400)="6263e0bc8dca30717a052ac40a0cbbe174f62e7835bf3e5c73f82dc2a71638d4480792f050a747e796a090e9d3bdca89691165877663eae5073e207aedbb040e", 0x40}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000003440)="b9ed22b75789810913993040e7779e32fe3c44f88bdb0bd87735df8d07dfc54ee7534e691040c7f821bfbf8469ea98b381e720361b2721b82a5c882f9a9713dbbb256ee3d27d2f3a382efc87750e8b7e239370b758b194e4faac55dd66a9360d98df08ce865a9c79", 0x68}, {&(0x7f00000034c0)="5f98cf27834eddf7b4052d6a500fd93753e36ae8990636986ff8f910ecb997ad1f1343a9ef4f45702f798b96ab3d558518a3f280761a3d5baa2052ca8a7d750b9097eac5bfef302c19c3f769f3c30934edf87473d992d30b64d02d80ae2466d373", 0x61}, {&(0x7f0000003540)="bc7339e1e48e68f4952bc272698d42defcc06cf4eecdf5fb5cca7370e056d71555da590c64e5cc5904", 0x29}], 0x7, &(0x7f0000003600)=[@hopopts_2292={{0x68, 0x29, 0x36, {0x8, 0x9, '\x00', [@jumbo={0xc2, 0x4, 0xffff}, @pad1, @ra={0x5, 0x2, 0x9}, @ra={0x5, 0x2, 0x40}, @hao={0xc9, 0x10, @local}, @jumbo={0xc2, 0x4, 0x5}, @calipso={0x7, 0x20, {0x2, 0x6, 0x79, 0x7fff, [0x1, 0x1, 0x3]}}, @enc_lim={0x4, 0x1, 0x2a}]}}}, @tclass={{0x14}}, @dstopts_2292={{0x28, 0x29, 0x4, {0x3b, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0xbd6e}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x17, 0x6, 0x0, 0x40, 0x0, [@empty, @mcast1, @local]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x3b, 0x6, 0x1, 0x40, 0x0, [@rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x3f}, @mcast2]}}}], 0x138}}, {{&(0x7f0000003740)={0xa, 0x4e20, 0xfffffff9, @empty, 0x20}, 0x1c, &(0x7f0000004a80)=[{&(0x7f0000003780)="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", 0xfc}, {&(0x7f0000003880)="6b863a3006bee868a26a47c89f41914c2fca73cf8d5d949242252a3b56b5abb291f8fd3d6a233ec00c3660dfaf", 0x2d}, {&(0x7f00000038c0)="a67b5bd02d9d92aab2ecdafe737e014538977ec13f537fc4c8b6d928a3726941ee16e7f48b20d5af3c6d300de07d1048d393c715fc00f4fba5a3f1dfe33914f5973b0a3e4b2ae81d094fa06b8980a03991392844c50cede74e8b7b85983dc9b5fa6c6c54803c74da18ef7d56c488f94b348a6226ecd3e60ffeefb1b35bf2c56cb0f78a2adb4096e3c51e302c882ebde4bbda81c90da268f9254893ce40ab4c82fb54dbed265df284ba9ba13525f195a6d7fb5838f3c7d94c08ec2f5b5e8daeae88448e49cac8b52cff434351f598286de14f4e5241c3ce9f9457b9a6c462c0617ba1", 0xe2}, {&(0x7f00000039c0)="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", 0x1000}, {&(0x7f00000049c0)="5ad90bc6ccc1050bc0195f3281e1b2cfd205e2f601aac6d689cf218064fca8b5c1bf7d835489d9db9857a5bbf877042e5f8e4dc256e52be6e3afba6c42a2d227ae758fd714c8ca29ebc6bf3a25c9f0b46aae0ca89e19d75c61ff70cf937812723eb0abce086be4450f7ae34ab2a8ae88492d9b39c3649e69b7314edc342e383906f3111840d6b1ff4c48cb2adaba3074106911883b27dc82", 0x98}], 0x5, &(0x7f0000004b00)=[@dstopts={{0xf0, 0x29, 0x37, {0x0, 0x1a, '\x00', [@generic={0x2, 0xba, "5e0452a9a99ee5079175bf380fe09266044d3975b5839c0193c6e77ba375816f6a01b7284196e9c77ea08fa3a3d8382f098ab6db16607b50106f751b5228da65f87a709f753b5f7edea99c3475ba0d83462ba2a252259a7ab6fff625814c0a32193f29b96d4659d882ef9dda36a18510d623c5bcd8ebe11da31597633f97baba9a480c6659262623dcddccceebb11386cd7e280f0078594b4883a0b96d0145c091b58dfe3f50d18b2e39fa4366705bece0b4388c7401c309caa6"}, @pad1, @hao={0xc9, 0x10, @private1}]}}}], 0xf0}}, {{&(0x7f0000004c00)={0xa, 0x4e22, 0x4, @private2, 0x430}, 0x1c, &(0x7f0000004d40)=[{&(0x7f0000004c40)="fe24f377a7e61fbdeb763a7edca7a22c7d291c732b4ec4bb5d6db93b351f593ad2b4a54b14514270a2d777b00e23a6b8ec44823d87857cc298cbbdad61389f72e6f773715325cd6ac194ea26fbac0e24a549197bcfb63065fa104e67947358939292fad48d05cde970599df176c65b5282a6719a43b6fbf71b7bc83f5e745b97a28f14a1a97f035701ec95d51298e50f80c6800ea74c7fa64858ccb16b185d1955377bfdffdac0ce0307f5c413c5a1a17b1891bdf2a6d33a05f964eb321d706fc00e6fa791596d4a007e937af3", 0xcd}], 0x1, &(0x7f0000004d80)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x11, 0x4, 0x1, 0x1, 0x0, [@rand_addr=' \x01\x00', @remote]}}}, @hopopts={{0x40, 0x29, 0x36, {0x2c, 0x4, '\x00', [@ra={0x5, 0x2, 0x4}, @pad1, @enc_lim={0x4, 0x1, 0x81}, @hao={0xc9, 0x10, @empty}, @jumbo, @enc_lim={0x4, 0x1, 0x9}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @rthdr={{0x28, 0x29, 0x39, {0x5c, 0x2, 0x2, 0x81, 0x0, [@mcast2]}}}, @dstopts_2292={{0x58, 0x29, 0x4, {0x2f, 0x8, '\x00', [@jumbo={0xc2, 0x4, 0x800}, @calipso={0x7, 0x38, {0x0, 0xc, 0x1, 0xf2, [0x8, 0x8, 0xffffffffffffff80, 0x3f, 0x1, 0x2]}}]}}}, @dstopts_2292={{0x170, 0x29, 0x4, {0x0, 0x2a, '\x00', [@pad1, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x3}, @calipso={0x7, 0x48, {0x2, 0x10, 0x3, 0xffff, [0x20, 0x4, 0x20, 0x0, 0x5, 0x2, 0x8, 0x6]}}, @padn={0x1, 0x1, [0x0]}, @enc_lim={0x4, 0x1, 0x1f}, @generic={0x1, 0xf3, "7479d1878b6c75f612f7dd6dee3e836517dcdb976f678eda48f5127dab17d4bfc3945a8825a7887fee970bb0acba1d07ba5ee0b02c9a34cf3c5ccf82069810ce0d05206076de8323e7e2ee7e36e040159b267d9f663ccfc84105c84b6af9d65bc781aea760829a23be1598f360a7b4362dab71b101a200c36158e40142b576a4416ce03b5e702042d9f05bcdfc95aeb3799aecc96858c1bd43b278ef78bf26a80306d72135ab07e896cca36f4f9ab50c6cf29e97a54da229511a563fbdda945205f2718c86d1511350c5fab87bf6b9bd62df51be74b630567efd498f221f9c815c4973a535878cc587d6955b43052c0ad0088e"}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x67, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x20}]}}}], 0x2b8}}], 0x7, 0x87d05abf472ddd2b) r10 = syz_open_procfs(r3, &(0x7f0000000080)='loginuid\x00') ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r10, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0xf}}, './file0\x00'}) 09:16:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xc001, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:16:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x5baa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2042.856296] loop5: detected capacity change from 0 to 264192 09:16:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x18}, {0x0, 0x0, 0x10000}]) [ 2042.904681] 9p: Unknown access argument À: -22 [ 2042.920874] loop7: detected capacity change from 0 to 256 [ 2042.938710] loop6: detected capacity change from 0 to 256 [ 2042.965668] 9p: Unknown access argument Ày: -22 [ 2042.988629] loop6: detected capacity change from 0 to 256 [ 2043.125202] 9p: Unknown access argument À: -22 09:16:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x1c}, {0x0, 0x0, 0x10000}]) 09:16:34 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fcntl$setlease(r0, 0x400, 0x2) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, @out_args}, '.\x00'}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x5e1080, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2000002, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_any}, {@privport}, {@afid={'afid', 0x3d, 0x1}}, {@afid}], [{@fowner_gt}, {@seclabel}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '('}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@dont_measure}, {@subj_user}]}}) 09:16:34 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xc101, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:16:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x5caa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:16:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x418d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:16:34 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 95) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:16:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7a000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:16:34 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2057.197883] loop6: detected capacity change from 0 to 256 [ 2057.205121] loop5: detected capacity change from 0 to 264192 [ 2057.206626] loop7: detected capacity change from 0 to 256 [ 2057.214381] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 2057.244098] 9p: Unknown access argument Ày: -22 [ 2057.264342] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 09:16:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x65}, {0x0, 0x0, 0x10000}]) [ 2057.270725] loop6: detected capacity change from 0 to 256 09:16:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x5daa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:16:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3d8ab2664d2e7cd5a8006f37873c0c5b5710deab65e43b247af6eae8d100"/50, @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2057.287299] 9p: Unknown access argument Ày: -22 [ 2057.433567] 9pnet_fd: Insufficient options for proto=fd [ 2057.446978] 9pnet_fd: Insufficient options for proto=fd 09:16:50 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:16:50 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 96) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:16:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x5eaa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:16:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x4302, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:16:50 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xf000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:16:50 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x488080, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend}, {@debug={'debug', 0x3d, 0x6}}, {@afid={'afid', 0x3d, 0xc5}}, {@aname={'aname', 0x3d, ':,-(^%\''}}, {@uname={'uname', 0x3d, ']},^^^'}}, {@version_u}], [{@hash}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@permit_directio}, {@seclabel}, {@subj_type={'subj_type', 0x3d, '9p\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '9p\x00'}}, {@hash}]}}) 09:16:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xf0}, {0x0, 0x0, 0x10000}]) 09:16:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x87af0100, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2072.848686] 9p: Unknown access argument À: -22 09:16:50 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2072.866122] 9p: Unknown access argument À: -22 09:16:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3dff4f661bc3d241c072d48d9489879b2af01c3b53b9ec72204fb0aa067f58b6c3bb30d2bdfd3d4cbeb5bb1d44c6aa9ee7a9e39668c00df379e96d5072e6ac2d9d981f01d8914812342226f7703bff7615549124545dfb4a22f9f1bff20ecf85de663ac9f8a91f0c8edfec5588aa43d57985f46ebbdbc530cf39a1b6ec5d7b0c5113c2c8f7fdd9", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x14, 0x40000) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000140)=0x300, 0x4) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r3, 0x3312, 0x4) [ 2072.891686] loop6: detected capacity change from 0 to 256 [ 2072.899395] loop7: detected capacity change from 0 to 256 [ 2072.901422] loop5: detected capacity change from 0 to 264192 [ 2072.906030] 9p: Unknown access argument Ày: -22 [ 2072.922601] loop6: detected capacity change from 0 to 256 [ 2072.924470] FAULT_INJECTION: forcing a failure. [ 2072.924470] name failslab, interval 1, probability 0, space 0, times 0 [ 2072.925689] CPU: 0 PID: 11122 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 2072.926240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2072.926796] Call Trace: [ 2072.926978] [ 2072.927144] dump_stack_lvl+0xc1/0xf0 09:16:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfe}, {0x0, 0x0, 0x10000}]) 09:16:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8084, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2072.927430] should_fail_ex+0x4b4/0x5b0 [ 2072.927892] should_failslab+0x9/0x20 [ 2072.928173] __kmem_cache_alloc_node+0x5b/0x310 [ 2072.928511] ? kobject_uevent_env+0x21e/0xf80 [ 2072.928833] ? __pfx_dev_uevent_name+0x10/0x10 [ 2072.929154] kmalloc_trace+0x26/0xc0 [ 2072.929423] ? __pfx_dev_uevent_name+0x10/0x10 [ 2072.929737] kobject_uevent_env+0x21e/0xf80 [ 2072.930041] ? kernfs_put+0x46/0x50 [ 2072.930309] __loop_clr_fd+0x2fa/0x900 [ 2072.930622] lo_ioctl+0x634/0x1990 [ 2072.930876] ? __pfx_lo_ioctl+0x10/0x10 [ 2072.931152] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2072.931516] ? __pfx_perf_tp_event+0x10/0x10 [ 2072.931825] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2072.932242] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 2072.932583] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 2072.932927] ? perf_trace_preemptirq_template+0x252/0x420 [ 2072.933310] ? perf_trace_lock+0xc1/0x480 [ 2072.933605] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2072.933990] ? do_vfs_ioctl+0x132/0x1690 [ 2072.934293] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2072.934689] ? blkdev_common_ioctl+0x19e/0x1950 [ 2072.935037] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 2072.935462] ? __pfx_blkdev_common_ioctl+0x10/0x10 [ 2072.935823] ? __destroy_inode+0x62c/0x750 [ 2072.936131] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 2072.936577] ? __pfx_lock_release+0x10/0x10 [ 2072.936897] ? __pfx_lo_ioctl+0x10/0x10 [ 2072.937193] blkdev_ioctl+0x35e/0x7e0 [ 2072.937463] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2072.937779] ? selinux_file_ioctl+0xba/0x270 [ 2072.938117] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2072.938446] __x64_sys_ioctl+0x19e/0x210 [ 2072.938757] do_syscall_64+0x3f/0x90 [ 2072.939042] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2072.939428] RIP: 0033:0x7f2fa42228d7 [ 2072.939701] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2072.940959] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2072.941501] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa42228d7 [ 2072.942006] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000008 [ 2072.942524] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 2072.943025] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000008 [ 2072.943534] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 2072.944049] 09:16:50 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:16:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x5faa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:16:50 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xf800, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:16:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:16:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x300}, {0x0, 0x0, 0x10000}]) [ 2073.058825] 9pnet_fd: Insufficient options for proto=fd [ 2073.066752] 9p: Unknown access argument Ày: -22 [ 2073.095734] 9p: Unknown access argument Ày: -22 [ 2073.104406] 9pnet_fd: Insufficient options for proto=fd 09:16:50 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 97) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:16:50 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:16:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x480}, {0x0, 0x0, 0x10000}]) [ 2073.130513] loop6: detected capacity change from 0 to 256 [ 2073.142330] loop5: detected capacity change from 0 to 264192 [ 2073.207568] loop7: detected capacity change from 0 to 256 09:17:02 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 98) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:17:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xae52ef62, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:17:02 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xfeff, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:17:02 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)={0x0, 0x0}) recvmmsg$unix(r3, &(0x7f0000000880)=[{{&(0x7f0000000440), 0x6e, &(0x7f0000000640)=[{&(0x7f00000004c0)=""/106, 0x6a}, {&(0x7f0000000340)=""/25, 0x19}, {&(0x7f0000000540)=""/84, 0x54}, {&(0x7f00000005c0)=""/38, 0x26}, {&(0x7f0000000600)=""/38, 0x26}], 0x5, &(0x7f00000006c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xc0}}, {{&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000800), 0x0, &(0x7f0000000840)}}], 0x2, 0x0, &(0x7f0000000940)={r4, r5+10000000}) r7 = signalfd4(r3, &(0x7f00000009c0)={[0x3]}, 0x8, 0x80800) clone3(&(0x7f0000000a00)={0x4200000, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140), {0x3}, &(0x7f0000000280)=""/178, 0xb2, &(0x7f0000000180)=""/49, &(0x7f0000000980)=[r6, r2], 0x2, {r7}}, 0x58) 09:17:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d35, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:02 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:17:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x60aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:17:02 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x500}, {0x0, 0x0, 0x10000}]) [ 2085.255703] loop5: detected capacity change from 0 to 264192 [ 2085.260840] loop6: detected capacity change from 0 to 256 [ 2085.272938] loop7: detected capacity change from 0 to 256 [ 2085.279699] 9p: Unknown access argument À: -22 [ 2085.294010] FAULT_INJECTION: forcing a failure. [ 2085.294010] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.295406] CPU: 1 PID: 11184 Comm: syz-executor.7 Not tainted 6.4.0-rc3-next-20230525 #1 [ 2085.296391] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2085.297380] Call Trace: [ 2085.297705] [ 2085.297994] dump_stack_lvl+0xc1/0xf0 [ 2085.298498] should_fail_ex+0x4b4/0x5b0 [ 2085.299046] should_failslab+0x9/0x20 [ 2085.299548] __kmem_cache_alloc_node+0x5b/0x310 [ 2085.300143] ? kobject_get_path+0xc9/0x1f0 [ 2085.300676] ? kobject_get_path+0xc9/0x1f0 [ 2085.301203] __kmalloc+0x4a/0x160 [ 2085.301663] kobject_get_path+0xc9/0x1f0 [ 2085.302178] ? kasan_set_track+0x25/0x30 [ 2085.302713] kobject_uevent_env+0x244/0xf80 [ 2085.303261] ? kernfs_put+0x46/0x50 [ 2085.303737] __loop_clr_fd+0x2fa/0x900 [ 2085.304254] lo_ioctl+0x634/0x1990 [ 2085.304712] ? do_syscall_64+0x3f/0x90 [ 2085.305226] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2085.305893] ? __pfx_lo_ioctl+0x10/0x10 [ 2085.306390] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2085.307047] ? __pfx_perf_tp_event+0x10/0x10 [ 2085.307598] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 2085.308229] ? __lock_acquire+0xc3f/0x6340 [ 2085.308775] ? __pfx_lock_release+0x10/0x10 [ 2085.309314] ? perf_trace_lock+0xc1/0x480 [ 2085.309857] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2085.310508] ? do_vfs_ioctl+0x132/0x1690 [ 2085.311046] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2085.311706] ? blkdev_common_ioctl+0x19e/0x1950 [ 2085.312301] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 2085.313020] ? __pfx_blkdev_common_ioctl+0x10/0x10 [ 2085.313639] ? __destroy_inode+0x62c/0x750 [ 2085.314164] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 2085.314940] ? __pfx_lock_release+0x10/0x10 [ 2085.315485] ? perf_trace_preemptirq_template+0x252/0x420 [ 2085.316185] ? __pfx_lo_ioctl+0x10/0x10 [ 2085.316681] blkdev_ioctl+0x35e/0x7e0 [ 2085.317171] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2085.317713] ? selinux_file_ioctl+0xba/0x270 [ 2085.318291] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2085.318870] __x64_sys_ioctl+0x19e/0x210 [ 2085.319404] do_syscall_64+0x3f/0x90 [ 2085.319898] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2085.320550] RIP: 0033:0x7f2fa42228d7 [ 2085.321017] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2085.323205] RSP: 002b:00007f2fa1797ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2085.324124] RAX: ffffffffffffffda RBX: 00007f2fa1797f40 RCX: 00007f2fa42228d7 [ 2085.324983] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000008 [ 2085.325839] RBP: 00007f2fa17986bc R08: 0000000000000001 R09: 00007f2fa1797d90 [ 2085.326718] R10: 00007f2fa1797c47 R11: 0000000000000246 R12: 0000000000000008 [ 2085.327572] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f2fa1797f80 [ 2085.328463] [ 2085.335657] loop6: detected capacity change from 0 to 256 09:17:03 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2085.455634] 9p: Unknown access argument À: -22 09:17:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) openat(r2, &(0x7f0000000080)='./file0\x00', 0x8400, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6fce", @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x600}, {0x0, 0x0, 0x10000}]) 09:17:15 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 99) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:17:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x61aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:17:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xc4100000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:17:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d36, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:15 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xff00, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:17:16 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2098.285946] loop6: detected capacity change from 0 to 256 [ 2098.289131] loop5: detected capacity change from 0 to 264192 [ 2098.298434] loop7: detected capacity change from 0 to 256 [ 2098.328626] 9pnet_fd: Insufficient options for proto=fd [ 2098.333385] loop6: detected capacity change from 0 to 256 [ 2098.377673] 9pnet_fd: Insufficient options for proto=fd 09:17:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d37, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x62aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:17:16 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:17:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x700}, {0x0, 0x0, 0x10000}]) 09:17:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xc9ffffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:17:16 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xfffe, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:17:16 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) (fail_nth: 100) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:17:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x509140, 0x147) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x10000, &(0x7f0000000100)=ANY=[@ANYBLOB='trao=\x00'/15, @ANYRESHEX=r0, @ANYRES32=0x0, @ANYRES16, @ANYBLOB="2c7d63636553733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2098.515401] loop5: detected capacity change from 0 to 264192 [ 2098.538467] loop7: detected capacity change from 0 to 256 [ 2098.544974] loop6: detected capacity change from 0 to 256 09:17:16 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2098.577062] loop6: detected capacity change from 0 to 256 09:17:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x1800}, {0x0, 0x0, 0x10000}]) 09:17:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xcc060000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:17:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x63aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:17:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="1fab3900e1ea7058c0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:30 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:17:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x64aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:17:30 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:17:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x1c00}, {0x0, 0x0, 0x10000}]) 09:17:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d38, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xee000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:17:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x1b1c8, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2112.375805] loop7: detected capacity change from 0 to 256 [ 2112.381809] 9pnet_fd: Insufficient options for proto=fd [ 2112.384800] loop6: detected capacity change from 0 to 256 [ 2112.388078] 9pnet_fd: Insufficient options for proto=fd 09:17:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RCREATE(r1, &(0x7f0000000080)={0x18, 0x73, 0x2, {{0x2, 0x3, 0x2}, 0x20}}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0xff, 0x0, 0x13, 0x0, 0x0, 0xffffffff, 0x0, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp, 0x0, 0x9, 0xda52aac3, 0x4, 0x5e63, 0x9, 0x0, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x8) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="c3b099036443d12aca5f8feec47187d2ecedd39cdbef5dd958b67707c5b63443c35532d32b29569e8fe30f9f464a691070da23d497aa65b55f52ad5be348f43222a79fb24440a13dd643cf2dfa750db9931d479864fce2f18a523c4f5991d9684693881479dd48ef78f954e80aec31b1e3", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0xed, 0x3f, 0xbc, 0x8, 0x0, 0x1, 0x0, 0x18b9f0fc1f966116, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x6, 0x51db}, 0x10, 0xfa, 0x8, 0x7, 0x4, 0x6, 0x9, 0x0, 0x20}, 0x0, 0x10, r2, 0x0) 09:17:30 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x2, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2112.423855] loop5: detected capacity change from 0 to 264192 09:17:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d39, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x2000}, {0x0, 0x0, 0x10000}]) [ 2112.480933] loop7: detected capacity change from 0 to 256 09:17:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf4010000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:17:30 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2112.507344] loop7: detected capacity change from 0 to 256 09:17:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x65aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:17:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@private1={0xfc, 0x1, '\x00', 0x1}}, 0x14) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2112.560890] loop6: detected capacity change from 0 to 256 09:17:30 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2112.627669] loop5: detected capacity change from 0 to 264192 [ 2112.724784] 9p: Unknown access argument À: -22 09:17:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x80000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:17:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d3a, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="000063076e6f3df5bb96935c20c561abea834b763fed688afe4981b10ab73389a4aacd98362954b2110aa76982bb387f02290add41eb5a8e52abe15146b7122e63d97c7ed600"/81, @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x66aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:17:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x6500}, {0x0, 0x0, 0x10000}]) 09:17:44 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x4, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:17:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf6ffffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:17:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2311000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2126.495439] loop5: detected capacity change from 0 to 264192 09:17:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x67aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2126.523163] loop6: detected capacity change from 0 to 1024 [ 2126.540192] 9pnet_fd: Insufficient options for proto=fd [ 2126.543785] loop7: detected capacity change from 0 to 256 [ 2126.562426] 9pnet_fd: Insufficient options for proto=fd 09:17:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x200, 0x50) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2004000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@fscache}, {@noextend}, {@access_user}, {@access_user}, {@version_9p2000}, {@cache_none}, {@fscache}, {@access_user}, {@cache_none}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}]}}) [ 2126.574424] loop6: detected capacity change from 0 to 1024 09:17:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x8004}, {0x0, 0x0, 0x10000}]) 09:17:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2126.607265] loop7: detected capacity change from 0 to 256 09:17:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf8000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:17:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x100000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:17:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xeffd}, {0x0, 0x0, 0x10000}]) [ 2126.699575] loop6: detected capacity change from 0 to 2048 [ 2126.702008] loop5: detected capacity change from 0 to 264192 09:17:44 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:17:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d3b, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x6800, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2126.747329] loop6: detected capacity change from 0 to 2048 09:17:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfcfdffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2126.782332] 9p: Unknown access argument À: -22 09:17:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x900000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2126.796463] 9pnet_fd: Insufficient options for proto=fd 09:17:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x2c02000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2126.806133] loop7: detected capacity change from 0 to 256 09:17:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x68aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2126.859013] loop7: detected capacity change from 0 to 256 [ 2126.861749] loop6: detected capacity change from 0 to 18432 09:17:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xf000}, {0x0, 0x0, 0x10000}]) [ 2126.876597] loop5: detected capacity change from 0 to 264192 [ 2126.907496] loop6: detected capacity change from 0 to 18432 09:17:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d3c, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x69aa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2127.207576] 9pnet_fd: Insufficient options for proto=fd 09:17:56 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfdef}, {0x0, 0x0, 0x10000}]) 09:17:56 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xf0ffff, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:17:56 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:17:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x6aaa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:17:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfdfdffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:17:56 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = geteuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x1191480, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@appraise}, {@dont_appraise}, {@fowner_eq={'fowner', 0x3d, r3}}]}}) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000002c0)='\x00', &(0x7f0000000300)='./file0\x00', r0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d3d, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:17:56 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2138.864578] 9p: Unknown access argument À: -22 [ 2138.887590] loop6: detected capacity change from 0 to 30847 [ 2138.893594] 9p: Unknown access argument À: -22 09:17:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x6baa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2138.897384] loop7: detected capacity change from 0 to 256 [ 2138.910009] loop5: detected capacity change from 0 to 264192 09:17:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getdents64(r3, &(0x7f0000000100)=""/97, 0x61) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trno=\x00'/15, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x224a40) 09:17:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d3e, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2138.947428] loop6: detected capacity change from 0 to 30847 [ 2138.951269] loop7: detected capacity change from 0 to 256 09:18:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfeff}, {0x0, 0x0, 0x10000}]) 09:18:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfdffffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:18:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) r4 = getpid() pidfd_open(r4, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000002c0)=0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = dup(r6) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r7, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r7, &(0x7f0000002880), 0x4000101, 0x0) clone3(&(0x7f0000000440)={0x10000000, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140), {0x2d}, &(0x7f0000000180)=""/4, 0x4, &(0x7f0000000280)=""/47, &(0x7f0000000300)=[r3, r4, r5], 0x3, {r7}}, 0x58) 09:18:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x6c00, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:18:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d3f, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:18:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x1000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:18:09 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x7, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:18:09 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:18:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfffe}, {0x0, 0x0, 0x10000}]) 09:18:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d40, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2152.022730] loop6: detected capacity change from 0 to 32768 [ 2152.026584] loop7: detected capacity change from 0 to 256 [ 2152.051483] 9p: Unknown access argument À: -22 [ 2152.058853] loop5: detected capacity change from 0 to 264192 [ 2152.077701] loop7: detected capacity change from 0 to 256 09:18:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x6caa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2152.097014] loop6: detected capacity change from 0 to 32768 09:18:09 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x4e00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:18:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x10040}, {0x0, 0x0, 0x10000}]) 09:18:09 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x8, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2152.154107] 9p: Unknown access argument Ày: -22 [ 2152.182655] 9p: Unknown access argument Ày: -22 [ 2152.211771] loop7: detected capacity change from 0 to 256 [ 2152.249822] loop7: detected capacity change from 0 to 256 09:18:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:18:22 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x9, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:18:22 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x2000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:18:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x20000}, {0x0, 0x0, 0x10000}]) 09:18:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfeffffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:18:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8d41, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:18:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x6daa, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:18:22 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x6500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2164.319749] 9p: Unknown access argument Ày: -22 [ 2164.331307] loop7: detected capacity change from 0 to 256 09:18:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x80000}, {0x0, 0x0, 0x10000}]) [ 2164.352112] 9p: Unknown access argument À: -22 [ 2164.360585] 9p: Unknown access argument Ày: -22 [ 2164.364135] 9p: Unknown access argument À: -22 09:18:22 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = signalfd4(r0, &(0x7f0000000200)={[0x5]}, 0x8, 0x40800) ioctl$BTRFS_IOC_INO_LOOKUP(r3, 0xd0009412, &(0x7f0000000500)={0x0, 0xfffffffffffffffa}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180), 0x2400, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@nodevmap}, {@version_9p2000}, {@access_uid={'access', 0x3d, 0xee01}}], [{@uid_gt={'uid>', r4}}, {@audit}]}}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x3, 0x80, 0x3, 0x0, 0x6, 0x1000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x7, 0x401}, 0x10, 0x8c, 0xff, 0x2, 0x7fff, 0x9, 0x6, 0x0, 0x5, 0x0, 0x8f}, 0x0, 0x2, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c776673848865290f07ce6264c088b3a51a092820e35d9580d1349366bf31dbb2e9a91b87de95d48b9a34b0d957f371fe8eb54c16a0dcc355e56f6c258701c3a34f07c854bacf", @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0fa78bbf112f3bcf586c8e4f6c3eece547c6cdbea1f1de30477f42d7b06a5ad5bd1b84800bd6b347d7e0e7a2a04303427e484c3fbf976d93b80697cbd493657047289eae3b4527fef6b7ed3b8d4468f7f1614c692bcd7c7b792f778c5607afcaa91326c353991ee29b79021"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2164.375109] loop5: detected capacity change from 0 to 264192 [ 2164.384569] loop6: detected capacity change from 0 to 65536 [ 2164.401715] loop7: detected capacity change from 0 to 256 [ 2164.433681] loop6: detected capacity change from 0 to 65536 [ 2164.505290] 9pnet_fd: Insufficient options for proto=fd [ 2164.514118] 9pnet_fd: Insufficient options for proto=fd [ 2177.317525] 9pnet_fd: Insufficient options for proto=fd [ 2177.323979] 9pnet_fd: Insufficient options for proto=fd 09:18:35 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x8004000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:18:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) faccessat2(r2, &(0x7f0000000080)='./file0\x00', 0x91, 0x1300) r4 = clone3(&(0x7f0000000100)={0x167363700, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e733d66642c726664b49ced3eaf5b69cfaa6e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x1, 0x3, 0x2, 0x0, 0x0, 0x40, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0x2}, 0x122, 0x9, 0x8, 0x4, 0xffffffffffffff81, 0x7fffffff, 0xfff9, 0x0, 0xffff8000, 0x0, 0x8}, r4, 0xc, r3, 0xa) 09:18:35 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xa, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:18:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xff000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:18:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x7400, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:18:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x3000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:18:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xedc0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2177.354639] loop5: detected capacity change from 0 to 264192 [ 2177.357130] loop6: detected capacity change from 0 to 98304 [ 2177.373350] loop6: detected capacity change from 0 to 98304 [ 2177.375899] loop7: detected capacity change from 0 to 256 09:18:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x200000}, {0x0, 0x0, 0x10000}]) 09:18:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="dbdd3536793e1eb3c0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:18:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x7a00, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2177.405360] loop7: detected capacity change from 0 to 256 09:18:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x4000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:18:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffefffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2177.436331] 9pnet_fd: Insufficient options for proto=fd 09:18:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x8084, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:18:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xf0ffff}, {0x0, 0x0, 0x10000}]) [ 2177.473419] 9pnet_fd: Insufficient options for proto=fd [ 2177.489116] loop6: detected capacity change from 0 to 131072 [ 2177.489665] loop5: detected capacity change from 0 to 264192 09:18:35 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xd, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:18:35 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:18:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x17fb9, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2177.511438] loop6: detected capacity change from 0 to 131072 09:18:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffaa55, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:18:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x5000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:18:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa4f, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2177.584278] loop7: detected capacity change from 0 to 256 [ 2177.605983] loop7: detected capacity change from 0 to 256 [ 2177.614664] loop5: detected capacity change from 0 to 264192 [ 2177.622622] loop6: detected capacity change from 0 to 163840 [ 2177.638736] loop6: detected capacity change from 0 to 163840 09:18:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb31c, 0x9}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount(&(0x7f0000000100)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='selinuxfs\x00', 0x5001, &(0x7f0000000300)='\xff\xff') mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="050000000000000051139dfaf40b3d", @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3d8b7d2d5477e141d0596bfb54e3aab0d0b66c080a4cb23e8f3cee67cfd1347e7ae56578f3f341db064b7df256ebc48ae21b691e147f3d8232224e448edad650142eb8dea420a8dce47066b4a53f98036a87859eb56f13e8b87073bffea2a9ec4a1d051a37000400005b74c83e98e82c620201633228e58743cd55700d6b9ab1a9acf8f7f0c528385842", @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x406000, 0x100) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) write$P9_RWRITE(r1, &(0x7f0000000080)={0xb, 0x77, 0x2, 0x4}, 0xb) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:18:35 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xf, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:18:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffefff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:18:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x6000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:18:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa50, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2177.737779] loop6: detected capacity change from 0 to 196608 [ 2177.752634] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2177.753277] Buffer I/O error on dev loop6, logical block 0, async page read [ 2177.753770] loop6: unable to read partition table [ 2177.757287] loop5: detected capacity change from 0 to 264192 [ 2177.760223] loop6: partition table beyond EOD, truncated [ 2177.767641] loop6: detected capacity change from 0 to 196608 [ 2177.795624] loop7: detected capacity change from 0 to 256 [ 2177.844769] loop7: detected capacity change from 0 to 256 09:18:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x1000000}, {0x0, 0x0, 0x10000}]) 09:18:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x2004010, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c77010000003d", @ANYRESHEX=r0, @ANYBLOB="4ef806c317806573733dc0fc32", @ANYRES32=r2]) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {0x0, 0x0}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}], 0xff, "3e3b3204ece552"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0xff, "3e3b3204ece552"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000640)={r4, r6, "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", "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"}) 09:18:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa51, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:18:48 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x10, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:18:48 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x7000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:18:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x1aca0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:18:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffff000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:18:48 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xbeb0010000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:18:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x2000000}, {0x0, 0x0, 0x10000}]) [ 2190.355818] loop7: detected capacity change from 0 to 256 [ 2190.360321] loop5: detected capacity change from 0 to 264192 [ 2190.369547] loop6: detected capacity change from 0 to 229376 [ 2190.389551] loop6: detected capacity change from 0 to 229376 09:18:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x80000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2190.408616] loop7: detected capacity change from 0 to 256 [ 2190.409619] 9pnet_fd: Insufficient options for proto=fd 09:18:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffdfc, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:18:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa52, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:18:48 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xf0ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:18:48 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x11, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2190.485732] loop5: detected capacity change from 0 to 264192 [ 2190.539783] loop7: detected capacity change from 0 to 256 [ 2190.572597] loop7: detected capacity change from 0 to 256 [ 2190.857516] 9pnet_fd: Insufficient options for proto=fd 09:19:00 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000200)=""/237, 0xed) clone3(&(0x7f00000003c0)={0x880000, &(0x7f00000000c0), 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c4063636573e63dc03062c2f77dfe28cb3d41b4fce40dc4fa90fb3ac42701e315d108b2062e86f688e3efdfbba5dfc62bfcbe745c4928d3b6416a2f56355b89fa8d42ff87b51713da2db71fb2d9f86bc7f70bc2507dfb2245fe5b2dbe5763020000004c4933074823e0625ea0a0089b24ec0d303fba2d4d085d304789f1b0bda7a63a4ee0bcd3c309d4f84a9b92fe90d9c79e5efb9d3ae604632f55b60457afa777dd84f57500"/179]) syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x8, 0x6, 0xff, 0xff, 0x0, 0x1, 0x2, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000080), 0x1}, 0x8, 0x750, 0x8, 0x1, 0xbee, 0xffffffff, 0x4, 0x0, 0x7fff, 0x0, 0x8}, 0xffffffffffffffff, 0x8, r3, 0x2) 09:19:00 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:19:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x1000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2202.468777] loop5: detected capacity change from 0 to 264192 09:19:00 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x8000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:19:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x3000000}, {0x0, 0x0, 0x10000}]) 09:19:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffdfd, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:19:00 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x12, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2202.482532] loop6: detected capacity change from 0 to 262144 09:19:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa53, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2202.493674] loop7: detected capacity change from 0 to 256 [ 2202.524280] loop6: detected capacity change from 0 to 262144 09:19:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffff97, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:19:00 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2202.536900] loop7: detected capacity change from 0 to 256 [ 2202.548872] 9p: Unknown access argument Ày: -22 09:19:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa54, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:19:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x4000000}, {0x0, 0x0, 0x10000}]) 09:19:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x2000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:00 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x9000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2202.607644] loop5: detected capacity change from 0 to 264192 [ 2202.657592] loop6: detected capacity change from 0 to 264192 [ 2202.699463] loop6: detected capacity change from 0 to 264192 [ 2202.702806] 9p: Unknown access argument Ày: -22 [ 2202.722171] 9p: Unknown access argument Ày: -22 09:19:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x38042, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000100)={0x1, 0x5}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x80c000, &(0x7f0000000140)=ANY=[@ANYRES64=r2]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:11 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:19:11 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x48, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:19:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffffc9, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:19:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x5000000}, {0x0, 0x0, 0x10000}]) 09:19:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa55, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:19:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:11 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xa000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2213.942217] loop5: detected capacity change from 0 to 264192 [ 2213.964030] loop7: detected capacity change from 0 to 256 [ 2213.969386] loop6: detected capacity change from 0 to 264192 09:19:11 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xff03000000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:19:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffff6, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2214.010208] loop7: detected capacity change from 0 to 256 [ 2214.018030] 9p: Unknown access argument Ày: -22 [ 2214.036159] loop6: detected capacity change from 0 to 264192 09:19:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x6000000}, {0x0, 0x0, 0x10000}]) [ 2214.069704] loop5: detected capacity change from 0 to 264192 [ 2214.069858] 9p: Unknown access argument Ày: -22 09:19:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa56, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:19:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x7000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:11 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x4c, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:19:11 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xd000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:19:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffd, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2214.157807] loop7: detected capacity change from 0 to 256 [ 2214.159712] loop6: detected capacity change from 0 to 264192 [ 2214.198707] loop7: detected capacity change from 0 to 256 [ 2214.207884] 9p: Unknown access argument Ày: -22 [ 2214.221171] loop6: detected capacity change from 0 to 264192 [ 2214.238471] 9p: Unknown access argument Ày: -22 09:19:24 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x55, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:19:24 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xffff1f0000000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:19:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x100040, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_mmap}, {@mmap}, {@version_9p2000}, {@msize={'msize', 0x3d, 0x7}}], [{@uid_lt={'uid<', 0xee00}}, {@audit}, {@smackfshat={'smackfshat', 0x3d, '9p\x00'}}, {@obj_user={'obj_user', 0x3d, '^.*,,'}}, {@appraise}]}}) 09:19:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffe, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:19:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa57, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:19:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x9000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:24 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xf000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:19:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x7000000}, {0x0, 0x0, 0x10000}]) [ 2227.076265] 9p: Unknown access argument À: -22 [ 2227.086211] loop5: detected capacity change from 0 to 264192 09:19:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x18000000}, {0x0, 0x0, 0x10000}]) [ 2227.115804] loop6: detected capacity change from 0 to 264192 [ 2227.119711] loop7: detected capacity change from 0 to 256 [ 2227.132616] 9p: Unknown access argument Ày: -22 09:19:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa58, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2227.195518] 9p: Unknown access argument Ày: -22 09:19:24 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:19:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:19:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x10000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2227.240453] loop7: detected capacity change from 0 to 256 [ 2227.274853] loop6: detected capacity change from 0 to 264192 [ 2227.340794] loop5: detected capacity change from 0 to 264192 [ 2227.370586] 9p: Unknown access argument Ày: -22 [ 2227.404709] 9p: Unknown access argument Ày: -22 09:19:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x1c000000}, {0x0, 0x0, 0x10000}]) 09:19:37 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x11000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:19:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8080}, 0x0, 0xa, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c616363657373ffc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:37 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:19:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x20000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2240.221337] loop5: detected capacity change from 0 to 264192 [ 2240.222539] loop7: detected capacity change from 0 to 256 09:19:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa59, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:19:37 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x68, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:19:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x40000100}, {0x0, 0x0, 0x10000}]) 09:19:38 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2240.280597] loop6: detected capacity change from 0 to 264192 [ 2240.280831] 9p: Unknown access argument Ày: -22 [ 2240.302531] loop6: detected capacity change from 0 to 264192 09:19:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2240.346281] 9p: Unknown access argument Ày: -22 09:19:38 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x6c, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:19:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x8000, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x200}, 0x1c) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x65000000}, {0x0, 0x0, 0x10000}]) [ 2240.386017] loop5: detected capacity change from 0 to 264192 09:19:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa5a, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:19:38 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:19:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x12000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:19:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x20100000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x10000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2240.461644] 9p: Unknown access argument À: -22 [ 2240.466622] loop7: detected capacity change from 0 to 256 [ 2240.476723] 9p: Unknown access argument À: -22 09:19:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x80040000}, {0x0, 0x0, 0x10000}]) 09:19:38 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x2) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) fstat(r3, &(0x7f0000000140)) [ 2240.508043] loop5: detected capacity change from 0 to 264192 [ 2240.509713] loop6: detected capacity change from 0 to 264192 09:19:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x358d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x40000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:19:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x8cffffff}, {0x0, 0x0, 0x10000}]) 09:19:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa5b, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:19:38 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2240.604896] 9p: Unknown access argument À: -22 [ 2240.611037] loop6: detected capacity change from 0 to 264192 [ 2240.615388] loop5: detected capacity change from 0 to 264192 [ 2240.639882] 9p: Unknown access argument À: -22 09:19:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x90000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2240.726687] loop5: detected capacity change from 0 to 264192 09:19:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x368d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:19:50 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x74, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:19:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa5c, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:19:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf0ffffffffffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:19:50 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x20000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:19:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xeffdffff}, {0x0, 0x0, 0x10000}]) 09:19:50 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:19:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x8000, 0x81}, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="7472faa29947461bc7616e733d66642c7266646e6f3d", @ANYRESHEX=r0, @ANYBLOB="48772e1b9b276f20f7e9ca959c605900"/27, @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x8, 0xa2202) [ 2252.877440] loop5: detected capacity change from 0 to 264192 [ 2252.889096] loop6: detected capacity change from 0 to 264192 09:19:50 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:19:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x100000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:19:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xf6ffffff}, {0x0, 0x0, 0x10000}]) [ 2252.957703] loop7: detected capacity change from 0 to 256 [ 2252.972437] loop5: detected capacity change from 0 to 264192 [ 2253.028379] loop7: detected capacity change from 0 to 256 [ 2253.039459] loop6: detected capacity change from 0 to 264192 09:20:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfcfdffff}, {0x0, 0x0, 0x10000}]) 09:20:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x378d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2265.899455] loop6: detected capacity change from 0 to 264192 09:20:03 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x29020000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:20:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa5d, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:20:03 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:20:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x200000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:20:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, r2, 0x0, &(0x7f0000000180)="f0", 0x1, 0x40000001}, 0x62f00) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) fstat(r3, &(0x7f0000000100)) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:20:03 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x7a, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2265.909333] loop7: detected capacity change from 0 to 256 [ 2265.912224] 9p: Unknown access argument À: -22 [ 2265.939276] loop6: detected capacity change from 0 to 264192 [ 2265.947641] 9p: Unknown access argument À: -22 [ 2265.951185] loop5: detected capacity change from 0 to 264192 [ 2265.954276] loop7: detected capacity change from 0 to 256 09:20:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x388d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:20:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v1={0x2, "fced04fd7edbc524bc2a"}, 0xb, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:20:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa5e, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:20:03 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:20:03 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x29110000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:20:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfeffffff}, {0x0, 0x0, 0x10000}]) [ 2266.069511] loop6: detected capacity change from 0 to 264192 09:20:03 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x90, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2266.137009] 9p: Unknown access argument À: -22 [ 2266.186745] 9p: Unknown access argument À: -22 [ 2266.188852] loop7: detected capacity change from 0 to 256 [ 2266.216810] loop7: detected capacity change from 0 to 256 09:20:18 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xec, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:20:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x300000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:20:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa5f, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:20:18 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file1\x00', 0x4, 0x0, 0x0, 0x2a7062, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='trusted.syz\x00', &(0x7f00000002c0)='\\[&%!.\xb0\x00', 0x8, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0/file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x20000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@loose}, {@afid={'afid', 0x3d, 0x7}}, {@noextend}, {@access_uid}, {@msize={'msize', 0x3d, 0x40}}, {@version_L}, {@mmap}, {@access_user}], [{@subj_type={'subj_type', 0x3d, '+@-.{^'}}, {@permit_directio}, {@dont_hash}, {@smackfshat={'smackfshat', 0x3d, '$:'}}, {@subj_type={'subj_type', 0x3d, '9p\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '[+%[{\'&%,'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', 0xee00}}]}}) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="7400800000000000000000000041af", @ANYRESHEX=r1, @ANYBLOB="2cec9a71c46f3dfa792c3a9b9e266071d6c06fec67d274f0bfb359893bab717ff9307fbf8d13d2cd13e9fa67b05669d5683cf437482e03697c59e607f3f7ffe0d36ccd045d9e74191324aecb8f6f0e54a140289e", @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0"]) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000700)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="02000000000000002e2f66696c653100db516806e6fb9a420190d58da3d0ac3a176b150db35a119274a04ee35e038a9a77ef6ebf4d9be07b71"]) r7 = syz_open_dev$vcsa(&(0x7f00000005c0), 0x1, 0x200100) setsockopt$inet6_tcp_TLS_TX(r7, 0x6, 0x1, &(0x7f0000000600)=@gcm_256={{0x304}, "6da6d77c4b118de4", "07153106858745c028e2c4210479996b6a0855df8ce7f741f99f19251a827187", "4330af89", "4dbf1f70af0a6682"}, 0x38) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = dup(r8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r9, &(0x7f0000002880), 0x4000101, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r6, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r9, {r10}}, './file1\x00'}) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:20:18 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:20:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfffff000}, {0x0, 0x0, 0x10000}]) 09:20:18 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x2e020000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:20:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x398d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2280.514014] loop7: detected capacity change from 0 to 256 [ 2280.525782] loop7: detected capacity change from 0 to 256 [ 2280.528570] loop5: detected capacity change from 0 to 264192 09:20:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3a8d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:20:18 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xed, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2280.582736] loop6: detected capacity change from 0 to 264192 09:20:18 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:20:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfffffdef}, {0x0, 0x0, 0x10000}]) 09:20:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x400000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:20:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa60, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2280.699887] loop5: detected capacity change from 0 to 264192 [ 2280.723691] loop7: detected capacity change from 0 to 256 09:20:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa61, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:20:18 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2280.745169] loop6: detected capacity change from 0 to 264192 09:20:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x500000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:20:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3b8d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2280.796067] loop5: detected capacity change from 0 to 264192 09:20:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfffffdfc}, {0x0, 0x0, 0x10000}]) [ 2280.882970] loop7: detected capacity change from 0 to 256 09:20:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xffffff8c}, {0x0, 0x0, 0x10000}]) 09:20:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x3e020000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:20:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2293.324219] 9p: Unknown access argument À: -22 09:20:31 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:20:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3c8d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:20:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa62, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:20:31 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xf0, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:20:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x511000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2293.337788] 9p: Unknown access argument À: -22 [ 2293.340733] loop6: detected capacity change from 0 to 264192 [ 2293.386629] loop6: detected capacity change from 0 to 264192 [ 2293.411163] loop5: detected capacity change from 0 to 264192 [ 2293.424758] loop7: detected capacity change from 0 to 256 [ 2293.458474] loop7: detected capacity change from 0 to 256 09:20:43 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xf8, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:20:43 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x18, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:20:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x600000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:20:43 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x3f000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:20:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfffffff6}, {0x0, 0x0, 0x10000}]) 09:20:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3d8d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:20:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa63, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:20:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) [ 2306.155048] loop5: detected capacity change from 0 to 264192 sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006000)=[{{&(0x7f0000000280)={0xa, 0x4e20, 0x9c, @loopback, 0x6}, 0x1c, &(0x7f0000000340)=[{&(0x7f00000002c0)="45a131dbeed309f954ace475f5b113c6ecc72dae6e2f43f457e1b07c71eab8335ac43cca1458847218a3e687e550c63d48fb9e49df0cdfe6f4c9e9ede74c37ce30c3b568676fee69e4b2de09f0f4a511569c1dcca9cb4b6db03aaccab0076c28118aec6461d5c94fca54269a81720814c29b4bbd338fe5e9", 0x78}], 0x1, &(0x7f0000000540)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0xfff}}, @hopopts={{0xb8, 0x29, 0x36, {0x0, 0x13, '\x00', [@generic={0x9, 0x19, "9163e1198f385f185759c9c0670899528c8103094b8942574b"}, @calipso={0x7, 0x40, {0x1f101943dd580e35, 0xe, 0xd, 0x1f, [0x0, 0x80000001, 0x1, 0xfff, 0x4, 0x2, 0xda4]}}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x30, {0x1, 0xa, 0x7f, 0xfffc, [0x44, 0x0, 0x5, 0x0, 0x2]}}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @tclass={{0x14, 0x29, 0x43, 0xaac}}], 0x100}}, {{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000640)="c6e911a13efb8da01a8da1433dba94c03a8d5e0e50a1b995909e711ba8dcc6aff69721459159d52ee03e28d6e3ce2897d3ba83402cabcae55ee29c1137c1c129359a02953a837c5776ddde9a498b8e2a791e3893d70beb32205dcc0b3199b875a5069b022997e3f31d92bc39bfd196294bf0", 0x72}, {&(0x7f00000006c0)="9b2eeb476213bfc66852dd7fbe16b059a71bc29a9015be7aaa73cd1ce8c1a3bbbddc9bc93e9fdc259eacc34adf4647570943db8b86b54b2570f2211e14721bf2e6ce0e1254225adc7eedc0b98ffa8bf2436f4a445c4ff98882e10778f93e541b460ffb4e3a04fa872d80361677aeeecae41a3dae18a1f29b7bbf4b6d4a75a760d55488e60ce1e4a8299e4e589dc02a484f88ab788c7c33a5bb03386ecd060636809037f2e065868a708feed2e797501ab1daa45db4270c3287d3fd0f3711a257a2cadf9322522cd95c6768e03203fc86cedda6d332eb9566e3a6361ee6adc88202b12bc6a620d2f12b3b0b9c63d76bed9c48b54779e23f24d57f3f5af5cdd84a25362cd22a72a22d88bb84119727b5b6ce509652b7507ca479475ccd73632707f5c4e76b66db826fb5563d7e2455eab446a940fc9f07eea67ac44745bde85b09f354010f1b6c9f961c4b38113d6ca0be55ddc6aba5a8e2c9d52b713e107f141d562588da7cbb6851e24ba16f809291e09d4a1847d87c5c469482c4c5dde87d250732ab11b077bbc74543812a4b9427c71ab6fb6c4637b981e9822eb786e3df345543746e2b145c6f58902066cb3b79823b9b389c949a0569bcb461365f8250a47c6e0056d1dca91526286e284ea05cf032c58666789cbe3517909e79ea597822d96bc9fbda99ace630566c202f88ecc40fa2ccb867e95e8d85eb7699fb71270da632d854b8948a1bea8576d77c3b5f322053176bfb01557156208f3e95d8536081b3af78efc9873e65a27cf6d0099eab844d3bc54900250efedfcf5cb6b72cf59f78c99ec8aa39885fef694de0c011f2ede67293cc542b712c469628f8c4773cec402428be656e4b1cb2aa2f54c1d9bb3819bf18ef3b3612c4b0688a31244e4ebd391356e7b4a2faf258cda30c25408668e2bd32c7fb9c2cb96661969d66860d9528c8508fa114386eaa3bbeb211d623a3a087d0be259ddf51600919a51f56c09137e972a18e2132e9f2cad8e44e4d35beb91c18f7c37825d57195b99ef6013244bbac92485c45e7d466e93b3a15a2c7ab85e355780d3f67ea68c4392736be6d554795ac1eee74ce1d74be5d314b8cd9e74b8f8d7bc5c611efe795ade91e9201fc00e639bd27dab1d8be00c141915f223d2787e164852f6be49cc163a4988ba15daf14e2e61cf2504a097c333322a4c93d55bf428007cf0e089f4a5f1bb90b362819b99c066e82b42cb0582e50ad7a458c8293db783b09e89278801e937cc8cf80208425f472aaeb69022e8ce01bd894f7fe35b25ed65b1dbe399d8a8c672f33da69f2d89e6691b977f2789f033d24dceb5bd36ef8716ae963e0e84b3ec62f2c492c7b038c26767f2bf2d08aac3600f40aa97ec2effdd5b6b4adb7a8c16173546769cbcd8fb38bbe68579ce14dc5bd1be84028f2ca01de2f69031d6f1e1949f80a1ff40f6ad57d97f80acf9074a1b8f9088de32947245730827eaa1edf81ef0948e8a1616a25daed3a5d10e44d450ec5c683675fd67b5df2427738eb1bbab4398d0722627a116b5fc151bcf0eb905d9b4429687ccc44a9783cc0a277a55b2f4bfb15a978d70b23b9947e76c69b7aeb2b8a4084b49d5ce0d8d4bbeeed07a40dfbf93bfa82a500796f8a0e6e502732284c1dbce5ce261980a8cb395fe4440d10780dc19dfe5d975eba0c28877e4b9e5a1c1a4dfdbe2dcad7be000e1b70637a79111c108492d467bd869c0d0f3d0d1781674609456a3ec2383b2f937d01aefa84bd2d1d00667691f7c80e8151c4cd01e7dc37249c92c92cdf4424caed3947d4d35344b190b793de394cd9a5c1d081f43ded9892efb23407b4cef8022474afcb614931f20085b8695641234c578f6c2db6adc265009925e24aaf5fd016aeda4e7853817215afbb1c6331582bb37200bd815fbf715c9b70b97855c8868ae427a9fdb2e2d9d5866a4012c6edfa1ed3c3313517968ba2253d9e1d13a1292c60e52d7be82b717a42db780eb997d57c2f7f66c64b23801d5f08d46b5e0b4b7113e9b2d385fb319eccea1869cab2486c9306e9d64dcdcd031d062ca667595787a33756d48336d4ea042daf7f046e583d6b1ddebf0694b0ebfdcddd4f4fff1c2ba3b9d5e60288ca2e39dde9aea13d5d205d1c868f7cbc63d05e3cd1aeb602ac0cde2bfd35c2462afd3bf85ae557369c6af0776cb0beaf181f8929fdc89d2dc1f1ff96b021861a13957cd9ab86dfc1c88cd0aab0c06cf3afb4ef828d1f0befdaf518f0e0811d178d32904db0a0b306fbb16474986a6093a964e0b19a4bcc34769bd18c49b58c7eb381c670ed5171609716ff85dfa30640c5021daac17195459819fd54b23b7dff38ec0c4b188b5770b20d7aa6f4f3426b92d050be386a5030d0c097ea33a0545246e3977074342dafc83c5da3464d17af63ad6b109491a68b54c011ee3634d2637745db292ae63ae5d01e221e23815fc3bb8988600d8853bf5c45440f2bdab9428f3391fd474dda5e6e6c53d5e12203be6e9955535d927ada9d42646b2dff9d3e59612df69b8bbbde8a2a577c8519500f44e82b05d018e565510ccd6bf07ecdce33aaf3f1e68464ab3dfefe161818688f5f7ed43e11e6b6733fca3acb2f6eed8af4152a817a552e8c409ec219d7bcb942b320fbbc2df5c57df435f83848ebaf112460f8beebe62571f5461dc6ca374e1e6e66b5ce25bc4974840bc6cbe728d4f9404bbb86010394e29c27862b0b60fde200d112ef96c7ea278761e8c81e4774b580418c6d2169c27ce342c1556c925fc6afe15351e9cafcb33aac6307a1f92ff084ea18ac235b7ea0a9288343244dcb5d059d8379463d876312300350990badd03dfd64006ec720293c8cc4abd676fd395fee3b6569a65826d0815605a8671d355d3a846ebd2844c24730494e417acd6a417768599c02e512652d62ae51084f24fa4816db85d4873da3bd2aac2bf6127dba3078d141358480d7e0b8d3fd1aa133be995bbdedb32413939de6c15bac2a505a5252fc2f3057db991ecabf4e9902e340ee1956a2842b62e7e5ac65e9079ac731ae8af6868814e662f5ddcee8515161b4ea3f6054057e120055b6768b531c84ad2fcd48a60cf26fd7b51766ac28788b14901fc29049cee5d9ecd580337fdb1e1a60f326b9ed9e3917b5cf0b0af8111347765241a25a2a94c93a3243aaa83af5f3a295da1db9a016baa77c357ea14d044a12e89b049dae39718cd6f744dc763fa08ebb9d6abef7f0ead476f74c2ac9431cf75eaf9a965620632d249d53c01681e2c94b18ff63b39982581e7f8213dd44b01da0933fd6e8b530884b852fb0cb0bad82a82464d894e383e8cd5587e439a1b04b2dc01e1b94f2ed2ab59af501d910cc14edb94f688ec155f80813c1f8ea83b28749ed88eb0ee106f19b50d99ea946cb6bf4ea6f88ea7d6eb5509ce3b6d5cd72249f707aeb3351e5600cf5e650e0b0e0882951470a78bddc3b21e6e479dd109ad8b0489ed599330e9acfee22656a2cac0f4c4cb755c7c21bd2241e6be291007f121fde0dde5f9380347c994258177f79fc4478fdecceaf9f90061a6b7fa17a40ae2897ddb29b3d3d40d288967c844dd65c027e63efc5369a5955f53fb891f7812cfbdc072d3adb33ab29e28aabf0782570484779964990cdc634c69683b19b6cfa756e747e045cc1059c42cd4e70e3e23396e6d1c73afae634d9e590dc800808128217eb8402d0704794a3cb851e9890ecb196667742647343305e011336374a5082aae1942ad5f19f46498e8e632cfa1be1e5f06dfd740f689fec5829c3a38fe24779bef6c58d3b99627c93f53390feeaf6e0a6fe6c0a319e34091088839f4a3c4617046b1e0c5ac3fd7c920ec93863ecd5e078f6b03252d85a1d882549ab1bc566efd0e3b7aea8c7370e2506a9c2ae0908a66721c5c2895d0265ea93bacc6ab95d987d7bffcf045606916d88044eaa0ef7cfa3cf2173f255a67fb00f0898ddf51f92c731d59e2270d988741ad6ab577453b5caa566529002b634db9bbe37ee77b1eba2a42a13cb0009df6ed179a53d02d492271494be033e3b1ae41a53bbf6cace9b847f01ab86bd2c1dc1071c2196c4afecd5e375eca5e73fe0cd95c83a8fee9c4b2cbc98a59298e0831f189519009569820e942dad2e101ec95d6cd313499aae20bbd8232efd5aeecf9c243470253806ab5253da497608eee960cc97e4dc2baa14fc3af15a35e7382a0aea9850b337f5967f922d740463d7be757d927cbfacda5dcb87d8b624ed2833bc326c14170fafd577bb612664f8631ac4fad31ce74d7a83919a72aa239553e9b5cb449b54930aa4a3f539db0a263ceb0a4b989f275b5796a43d022f0dc144c9e51b3bb4a82a41d7e88ef4f071478e456b051a56be775360932a39e7870d9cf88df31b383432efafd87153caa3d11a755f0f4bba536699b244c351d2fed5c6d29768672918f848318a49b59b05dcb26bd653fe9e4e92a0b71a10bea897cfcaca8bbe0deeaad83615e2764d666cc75e7707d0b301137504dd0012f0eeb3ca53eb18ce4fb546df817fe7f5d30a62d7407fac1d2c3c83a84ff13055234a900aabba6f7e6527d18ec2108b3e9f649d65463a3d4022e2a136e2d62aaa681e134aac654dd8a98c97a191cacbc9fce71fc4d9815c80d5fbf75e896ecb3d499dbfc774f710f88bd106dd2e2082fda5a449589f6471396b8ed79aaa0f10c101949e08a2cff9d483fb8cfc3ccf8c5470540867dfcdee2ec6567a0e1912bba03d9cb7a855b34b15c7c95fc61dba8158edc3458a72878c47bf85f191ca6d2ad7405821aa6388fe645ef6c84b353d8166364428a55476e19f01451e378b10635fe8d80cdf642686adff5612a1476b5d81634fab4e03a5654af5fb665cc3d8ba0d8a186675a6cd488075f103e8082cf295d1f42cefe537066b894680157b05ffe8a15ac78ef40286c93fc300339525d4a541c931d0ea794f38b9f4166ddaefcd23e431fd7ee96552d25922780ab8f06b5757962f31140ad120ebf32746c14ca3eff7fa420d9375a591f1fb33fd09dcc1a586bfa5aeb1d5c4a8dd68fdb1f22a5b7357db8c8182aa4f0a891ec6cd3029a23d3606f776c6174c8b5043a8665a0757640b9442319a9cff5a43dd662ae490cd1cc6a2951bc319ae1f31af16d94aaf55f403105899742852d0e21418fc356e6364b24b7e5d956dd4960386511fe1da7a849543066c6e39921c54aa6f600f739f584f5a1f9b24cf2ca103bdcd6601db959768ea5c484690998182292e560b9b4a0dd82dea81eb06dd943ac9579d9b4def4467d0caf3c27ca06e94a13fc847054fb584a7367afacb5584678d56a1eaaf35924dd998fb9a76375c2664cd4d83bc651a8a50f85cf6f03606d46d987ce8b8035c460b60821d2cd821d632d3a8c5a94276f95ad1828c4093d2ce74a382ee3a31e5ef17ca5168205329d0aef6c0c27d69fbd7f540d2bcbfea71ec2b55a8a45bd30a5c4951a4db13eff518e8e4393125d1544b2a581bb2f71cd4563a3cf098afcd17ba86690a12d4113af1378c44faccacfb984c68f7fde661be5fbaaec30b463065f85153202c8f4157928f828def6d2febd99eaae5395c675873ceb98972ca13ddf40602744f70e5f46a6284ea208333835aae75cecfd3d8580673bbf9c336738b65f9d84d09e96a3c8a02158ddb1cb3258890751e69a31ca1b3b2d9cad9aa64388d91869aa1807854da7a2f9e0d483098e2f9279ca100c02d588cc091263dc9f033f0c69f293f70acf7d756a1a9db4dd45073fa46b924976167", 0x1000}, {&(0x7f00000016c0)="aec592e4d0c0e9c5841209d296cfa838a7c3df73af21e7b5cab8580d1ee61bd0af8fa14d2cd47429380f91449465360d990fb22ba08b7b65aeac34dbe8402ea686d414c94e8e37ec9157890ed08a", 0x4e}], 0x3}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000001780)="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", 0x1000}, {&(0x7f0000002780)="fa571013f6026432e5fd2c920bfe2bc399fa10b4a6aa1e03b3e5126700cdb8b38884", 0x22}, {&(0x7f00000027c0)="0db1a75e0b91856197c4c7db8b7d9b727ee084dd444caf554811e092e423a6aabfe4e0d68c0c07f5289bd33c48d49745358df5cd387d0a65594c1951a69b6dd20d4a449bd37b95bbe0d15bc75e275688ed2ea41254e053044b31937465a72b2fd4d96c2f4bb91b29ed48acdd5138aad50d357aabc0dc56d36addfba0eb731898060ba5396ba3547abe15eb3302b926c99861f510be6e103a0b3b1356abaed3240062c62adb43e5fbe2c400c200b1e824e06048597839913ea480fcccf9ab2f44036c", 0xc2}], 0x3, &(0x7f0000002900)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x93}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x3c, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x8}]}}}, @dstopts={{0x1020, 0x29, 0x37, {0x3b, 0x200, '\x00', [@generic={0x3, 0x1000, "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"}]}}}, @tclass={{0x14, 0x29, 0x43, 0x1b}}], 0x1070}}, {{&(0x7f0000003980)={0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, '\x00', 0xe}, 0x25cfd162}, 0x1c, &(0x7f0000004ec0)=[{&(0x7f00000039c0)="137fd159cad7e268b06deeecc24563bba39e59360108060acb47368ee60cfd462ed83cb6eeb58f0329e1d0d3b2d8ead033edfd34ddb21605ada229b608ae48d08cb60333ebe845e782e040f147b5436e9509a937f844c9427d6323577412dc25ffdaf0ee0058ed6ae72511a1323347ae857e6ac148e89196a4ec9a6d19110b50028238e32f3827d34f1d729f25d282af795bce5bdd77fc8e27d7e0f8799530dcc6045f1fd3f1857107152866535c81923368", 0xb2}, {&(0x7f0000003a80)="3786f9830b741d35be6d19ed940f84fd3837d309a186a212885d74edd976a383b2643122f3f47df4ce1b35e6110ab59e94e682822653eb216be54e3e85a17ff5b14790668b1fb24c97b48a86d5f6a0804c2c5495f2db287d1e0b5aa05c0c645b498a1a8a81c15eb09e166f765f5cc577403e38da68c2522066894a6336fe71075be1bcc3ec4b83a7dd006a8a96fa4b605805a61bb564877661cfe27f8b52ce258141196f1c394c263f41a7a6e5fd7ef3e6f8936c741b7da6ca1649c4ddc3bcad4a37906428f7907db7f086f8fc10ef11560b6ec17fbc", 0xd6}, {&(0x7f0000003b80)}, {&(0x7f0000003bc0)="caced5df76850d702f3ec9b6a532543769f3d7308de841a1931cd0bf9f7b5d45744d23ac0490b199b83b346e4f22d23bd25cb6fca53f7df61acc616408c35a9208b511f5f9263a66ea9f2e18c4e550f2456e540dd4770cca2e6fbf8bdce0fdf9f2e7d73c5f5f818f38ca4154d1de8454f3e8e187e637cd8fde6cc02a90e433539d8feb5f", 0x84}, {&(0x7f0000003c80)="3ee2a491e36597cc65437ea02d0543b7a4561bb0a0bc14e093274b", 0x1b}, {&(0x7f0000003cc0)="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", 0x1000}, {&(0x7f0000003b80)="1cd9c3ec715391e4bab6ae9df51f440744eb2240ad6f3d7f39d53f6e4cfe7132fd4c8f6b00510cd3fccee62d9cc07c", 0x2f}, {&(0x7f0000004d00)="8eb3cd12c2c651d12e9a3382804bec612c590da613c3c082830c9bf5ff995f383a0089ca6c8c55c2061ba32316a9aa251a9b813f3f4a3133b252813a413ceec8e54bf4bbe4a0c8bf3e3849841d3cb848c94326c885f63c7bf1d39a17be96df0612b650dce22985d13b5a3deac200a87285e7f182992345d1e308fb2bba633710cce61d241f15486d31d6353aa8d6270012b505e9a737624e681c3de3996db8a134ee76048daec26d3faf45", 0xab}, {&(0x7f0000004dc0)="781c97a7b95ac116f82206bd88f6fb10545ae331e36c0c41011e03b2d94692cb56661797f71d6341164780d16b224ad8f4c1cb97f7490ace330bba18fb701120d4b44beef1e6a419dac7085adfb01554d048d162c2a959ff0015ba8a7d2c62419c1a6be376aa67dddd8e49631cce851f859d42ad782263318ae4d13d6f59429723060a66b4d1abf67d97dd9aebaa7c5e83923630ad68a6baa1ebdedee90cccfb7e6746a79da11443c979672d85317a87a70e819e26e12963eeec54d855b363b070a8a3201e84e45514fd058ba0353e380a03fda0ef33ae80244baa0133f697a233ab30acf1601b4b5147bf02104002", 0xef}], 0x9, &(0x7f0000004f80)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @hoplimit={{0x14, 0x29, 0x34, 0x70f}}], 0x30}}, {{&(0x7f0000004fc0)={0xa, 0x4e22, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}, 0x1c, &(0x7f0000005280)=[{&(0x7f0000005000)="cb97c0dcb9f34424bb63a346a66024814e9efde54ba5bf9f04a8b4f8ac6948e2bcd39b8c7fe04f6b93e035a93c1541871e4ba532f4015fba45938642a075872ae9082442cf9281d62ba292f9045e3a021e0b36c312", 0x55}, {&(0x7f0000005080)="47152fbeb0232b1333fea1f8488ab4000a071ee83982c75db46186834547b8d6f150e4ccbd052a995cdd7aaa12fe3782ba3ca38988187a9f65d8baa60c1a13b960676515f8149bb0067d67e9d3678e453aa4e9e671f9f0cd544dc3e8aba82deb8a1039171a19a9afb7dfe85d259f7ee02e7edfb3d79e2b3b7532856b19f72467d600e40b907f08862d7cbb9367ded441244f6b79a4f112c90be33187542093f3a8257e752e8e18b0bdc552fa3582b51bdfd292c1bf1520750f2eced0a8a0116844d0ac11787d955e2924c5fdf701aaa8473b0a0260c8a62b7c2a8c3dc06e5654f941a3a3e9", 0xe5}, {&(0x7f0000005180)="fc0dc4", 0x3}, {&(0x7f00000051c0)="bbb97c5c8ca9495efe7d26fa5d7f250175ede26ca3b1fcb6378194e9619cdaa9f08a49892c763e828f4d5e0cf263c4e081fe0bd93a29a3527d376fd5363bce34389e7a0b2babd517e5daafb1adc27c75c0e0dcb93cb8431396a701a775d512f091be213d45f35e5c306a352502042c81e0b1a96c2eceb8af694a0fec70caf3115dfe96818ed1f5b504532b15627b93564de687e920ca91b6873708", 0x9b}], 0x4, &(0x7f0000006200)=[@rthdr_2292={{0x88, 0x29, 0x39, {0x0, 0xe, 0x0, 0x5, 0x0, [@empty, @local, @private0, @loopback, @dev={0xfe, 0x80, '\x00', 0x1f}, @local, @private1]}}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x2d, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast1}, @pad1]}}}], 0xb8}}, {{&(0x7f0000005340)={0xa, 0x4e20, 0xffff8000, @loopback, 0x2fc0}, 0x1c, &(0x7f00000054c0)=[{&(0x7f0000005380)="a004d844ee297b1216f47dfd6cf67fd734534c9d34d77fafe61fad83bd5f8662e16a076c3799ce93b3c914e6d617726926305186b34a112038851f92cfad429949f433fd81d8e086654b21fa987244134c14de4183763ee5d99c8314072a3c2eef7e32014ecb215c42cfe3d4f37c54fd", 0x70}, {&(0x7f0000005400)="6fb240177d15b4b2386a88cd7fd6d9d450fcf617896f6468d71e4b8ee082ebb8c75468507f0d1eab9670b611abe84e4f7a4d4bd7204f6130a5c07579cad808222a72a8e30c55ed10c216bd08c57af42ce12fc2720e6e0ab6699ef731a34b3f59536faf52be499b14f0a400825760c927121654942469e52dd752f4f676b6a068a913", 0x82}], 0x2, &(0x7f0000005500)=[@dontfrag={{0x14, 0x29, 0x3e, 0xc523}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x3b, 0x2, 0x2, 0x7, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @rthdr={{0x98, 0x29, 0x39, {0x67, 0x10, 0x2, 0xff, 0x0, [@mcast1, @remote, @mcast2, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast1, @private2, @local]}}}, @hopopts={{0xb0, 0x29, 0x36, {0x6, 0x12, '\x00', [@calipso={0x7, 0x18, {0x0, 0x4, 0x2, 0x3, [0x7b9, 0x7fff]}}, @generic={0xa6, 0x6b, "dabfaa972a1fd968c94153197ecaeb2e572620aff64efeaa9e14d54532be0a1f6301c73a79a6d7ce705a3ae22b10de8dc5f3f1f7baceb77df3e1d13fea494a625a7a262263bcfafe13de673cea3aabb4c15fe3b6bb79b35794869729ae99849b3271d58d1ea378a430b96d"}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @jumbo={0xc2, 0x4, 0xc7}]}}}, @rthdr_2292={{0x58, 0x29, 0x39, {0xff, 0x8, 0x0, 0x5, 0x0, [@mcast2, @ipv4={'\x00', '\xff\xff', @empty}, @ipv4={'\x00', '\xff\xff', @empty}, @dev={0xfe, 0x80, '\x00', 0x31}]}}}, @rthdr_2292={{0xb8, 0x29, 0x39, {0x87, 0x14, 0x1, 0x95, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, @mcast1, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0={0xfc, 0x0, '\x00', 0x1}, @loopback, @loopback, @private2]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x3a, 0x2, '\x00', [@padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1}, @ra={0x5, 0x2, 0x5}]}}}, @dstopts={{0x38, 0x29, 0x37, {0x3a, 0x3, '\x00', [@enc_lim={0x4, 0x1, 0x4}, @enc_lim={0x4, 0x1, 0x20}, @hao={0xc9, 0x10, @loopback}, @jumbo={0xc2, 0x4, 0x2}]}}}, @tclass={{0x14, 0x29, 0x43, 0x818}}], 0x318}}, {{&(0x7f0000005840)={0xa, 0x4e24, 0x4, @remote, 0x7}, 0x1c, &(0x7f0000005940)=[{&(0x7f0000005880)}, {&(0x7f00000058c0)="31cf2fd41e3d6ec117de7bb23e1de5d9a7c1def2f8c809cd7ef57724bdce486a30dd936a3b91fa0c0e6dd9c87d64a846477ea58cded3065bbc3a36252d2374a0fa33d12e668fff0e65a9847358ec2e68ed178e07e07b4e04fcabfbfd0dbc00f072a76dd9b4eff83bcb44fa2fa5719701ba", 0x71}], 0x2, &(0x7f0000005980)=[@dstopts={{0x140, 0x29, 0x37, {0x2c, 0x24, '\x00', [@jumbo={0xc2, 0x4, 0x1}, @enc_lim={0x4, 0x1, 0x40}, @generic={0x81, 0xfe, "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"}, @ra={0x5, 0x2, 0x8}, @pad1, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @multicast2}}]}}}, @tclass={{0x14, 0x29, 0x43, 0x9ab}}], 0x158}}, {{&(0x7f0000005b00)={0xa, 0x4e21, 0x8001, @local, 0xffffffff}, 0x1c, &(0x7f0000005dc0)=[{&(0x7f0000005b40)="fd11742a1c75a477d1f39249bd7d1766d987faffb8e54c286012d5c6c733a388a948db54ab8347e2fcc3c9f30363d7fb1ec2e35edbb7806714d910f49fcc19c6820c52e3c98650ed4d21ddc0fb89d401a0c1006f4a163c2fbdf1593fac0b212bb6dd90562f67ea480b6cbff63ce102e298bd33a9a39e4b4bb793c207129f079818d017825cc27a2bc5ff7a68431eb495886c4e50465cf678", 0x98}, {&(0x7f0000005c00)="81631a88c676f3c61d51ba3a3d7c23bcd6f2c0bc335b2abf87e62580093426a73147570a6aded53fab9a7cc7a2cfa4ffdd0cc03265df380a03052b14e25f33262c8afc827f45e6bdffccc18574c518eb95713d5cf0dc56ace478ff0087d685e326232a3008038b0e8406a37d297f5e391a03ff000853296a6ed35731a9", 0x7d}, {&(0x7f0000005c80)}, {&(0x7f0000005cc0)="7948be8a62ecde7f2b04b0f4c9d1dce0e5a2c2c8275e1e1793b6fabd3d4e82722018ea681c", 0x25}, {0xfffffffffffffffc}, {&(0x7f0000005d00)="721c702e4554bd20a13493ccf7ee72f93b39a1d14fedbcd7f7d174b6c0f2a813fe99800ba66da4f88ff885a2262c467fcdc855d43c9b74b464a28f0dfd8102ee06818fb46e9293f556154b051ff399d3b55fb2e209cb24be9df0a1ef311862148937f88d7e9e68bfff4f42579c548870ad8144c9ba6dde84af8a9d7ff08d25e3b74e8464ad860cbf38a89ba8be1de49374d5f9458049cf72d64691185a245234bbe5598ca9de40a5178e193acc48", 0xae}], 0x6, &(0x7f0000005e40)=[@rthdr={{0x48, 0x29, 0x39, {0x32, 0x6, 0x0, 0x7, 0x0, [@local, @private0={0xfc, 0x0, '\x00', 0x1}, @remote]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x400}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}, @tclass={{0x14, 0x29, 0x43, 0x2}}, @dstopts={{0x70, 0x29, 0x37, {0xc, 0xa, '\x00', [@generic={0x0, 0x44, "de9a6bd20d1bff65cf25bfa060ac10a1f26d9f23d3ab7e9a0405b995bbcf66b68955ed5e7afe974cecba32155eb0419b6643edcd825e4e6753965ff2d02c9c0c1a0926d3"}, @enc_lim={0x4, 0x1, 0x22}, @jumbo={0xc2, 0x4, 0x10001}, @enc_lim={0x4, 0x1, 0x1f}]}}}, @rthdrdstopts={{0x18}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x30, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x8}, @padn={0x1, 0x1, [0x0]}]}}}], 0x138}}], 0x8, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x101000, 0x0) fcntl$dupfd(r2, 0x406, r3) dup(r0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r4) syz_open_dev$vcsa(0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000080)) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x3030891, &(0x7f0000000440)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_fscache}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@posixacl}, {@cache_loose}, {@version_L}], [{@hash}, {@smackfsdef={'smackfsdef', 0x3d, '}'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ff}}]}}) 09:20:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa64, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2306.229853] loop6: detected capacity change from 0 to 264192 09:20:43 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x25, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2306.256438] loop7: detected capacity change from 0 to 256 09:20:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfffffffe}, {0x0, 0x0, 0x10000}]) 09:20:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x700000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2306.347757] loop6: detected capacity change from 0 to 264192 [ 2306.374684] loop7: detected capacity change from 0 to 256 [ 2306.408671] loop5: detected capacity change from 0 to 264192 09:20:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3e8d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:20:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa65, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:20:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x48000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:20:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x20000000000}, {0x0, 0x0, 0x10000}]) 09:20:44 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xfe, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:20:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x4e, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:20:44 executing program 1: syz_usb_ep_read(0xffffffffffffffff, 0x80, 0xa2, &(0x7f0000000100)=""/162) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2306.637246] loop6: detected capacity change from 0 to 264192 [ 2306.657618] loop7: detected capacity change from 0 to 256 [ 2306.680776] loop6: detected capacity change from 0 to 264192 [ 2306.750442] 9p: Unknown access argument À: -22 [ 2306.778618] loop7: detected capacity change from 0 to 256 [ 2307.268759] 9p: Unknown access argument À: -22 09:20:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa66, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:20:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x80000000) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x301200, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x400040) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x200000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@posixacl}, {@privport}, {@msize={'msize', 0x3d, 0xfffffffffffffffa}}, {@debug={'debug', 0x3d, 0x3}}], [{@fsname={'fsname', 0x3d, '9p\x00'}}, {@fsname={'fsname', 0x3d, '9p\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@smackfstransmute={'smackfstransmute', 0x3d, '9p\x00'}}, {@subj_role={'subj_role', 0x3d, '9p\x00'}}]}}) 09:20:57 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x12c, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:20:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x800000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:20:57 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x65, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:20:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x1000000000000}, {0x0, 0x0, 0x10000}]) 09:20:57 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x4c000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:20:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3f000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2320.255696] loop5: detected capacity change from 0 to 264192 09:20:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa67, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2320.269362] loop6: detected capacity change from 0 to 264192 09:20:58 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x22c, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2320.283351] loop7: detected capacity change from 0 to 256 [ 2320.291273] loop6: detected capacity change from 0 to 264192 [ 2320.304703] loop7: detected capacity change from 0 to 256 [ 2320.311771] 9p: Unknown access argument Ày: -22 [ 2320.343616] 9p: Unknown access argument À: -22 [ 2320.347724] 9p: Unknown access argument Ày: -22 09:20:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x900000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:20:58 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x12d, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:20:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x8000000000000}, {0x0, 0x0, 0x10000}]) [ 2320.409822] loop5: detected capacity change from 0 to 264192 [ 2320.490800] loop7: detected capacity change from 0 to 256 [ 2320.538640] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2320.539407] Buffer I/O error on dev loop7, logical block 0, async page read [ 2320.540541] loop7: unable to read partition table [ 2320.541027] loop7: partition table beyond EOD, truncated [ 2320.562559] loop7: detected capacity change from 0 to 256 [ 2334.861518] loop6: detected capacity change from 0 to 264192 [ 2334.869096] loop5: detected capacity change from 0 to 264192 09:21:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x3f8d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:21:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa68, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:21:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="3d0000000000055199c6c6730ab67dedcb7f5fe353696daab6fc2a0267c0b5beb9097f9c74ead72fc08cc0be4d363c51290e24da3662b9b2cadc8f6d06bfe1bec36bc47680eda1c8cc8b77c5e0a25e3e16e2e7587b388a1b920739072e7f1535e771ff7e06e744cb7dc2a1dc15fad5f912bba6f88a637219d8a2d79283d3559644c7113ad7947e4dbe346957ecfc39929b3d37b590da09c4e928361abdb851ed71522995561cb49f2fe27d85fb9f593cd30dbd260237ac5ecf7a2b382932d3207e85e545b67a18b84b3b3c30ce5f8f6dd231709b4be5a1e716e937d7a95348b17f88fd", @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:21:12 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x2fe, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:21:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa00000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:21:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:21:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x20000000000000}, {0x0, 0x0, 0x10000}]) 09:21:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x55000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2334.877711] 9pnet_fd: Insufficient options for proto=fd [ 2334.879209] loop6: detected capacity change from 0 to 264192 [ 2334.885615] loop7: detected capacity change from 0 to 256 [ 2334.897181] 9pnet_fd: Insufficient options for proto=fd [ 2334.913575] loop7: detected capacity change from 0 to 256 09:21:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000280)={0x338362780, &(0x7f00000000c0), 0x0, 0x0, {0x10000008}, 0x0, 0x0, 0x0, 0x0}, 0x93) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v1={0x2, "b796a7e3ee552526422b41c4"}, 0xd, 0x3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:21:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xc07000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:21:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x55aaffff, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2334.999112] loop5: detected capacity change from 0 to 264192 09:21:12 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x300, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:21:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa69, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:21:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x480, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:21:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x408d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:21:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xf0ffffffffffff}, {0x0, 0x0, 0x10000}]) [ 2335.032340] 9p: Unknown access argument À: -22 [ 2335.054770] 9p: Unknown access argument À: -22 [ 2335.070588] loop6: detected capacity change from 0 to 264192 09:21:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:21:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa6a, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:21:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xd00000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:21:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x418d0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2335.149744] loop7: detected capacity change from 0 to 256 09:21:12 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="2b72616e733d66642c7262646e6f3de5ab870b68178263ac13e02a2291ce867de0b87963aacc45db678e6bc54cfe647dedc650304769c554e4b520c14686d41f69dfe630d722ee26fd9846480f002f92e6f1480263b970c0a39704b8393b10179e6d0089730e973eedfd323e7066e542df1b13d5070c9a9f8c92ae5e2f9e5f62179989c3e180a0bf2cca5a22ddda304d602f3bc35f08b5c833f8de0f498c38ae8649bf311b69724b8fc450130b4d8db4b1e60af27d7b9c1909e766cf3a2cef63471801d5843431484ad79452754e6eee09cfa1a9a881fdefb9beb56062f03356aa55493be6996bc7a74a56", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0"]) r3 = syz_open_dev$vcsu(&(0x7f00000015c0), 0xfffffffffffff1a4, 0x414002) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0xe00) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000001600)={@ipv4={'\x00', '\xff\xff', @multicast1}, 0x1d, r6}) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2335.184593] loop5: detected capacity change from 0 to 264192 09:21:12 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:21:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x100000000000000}, {0x0, 0x0, 0x10000}]) 09:21:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa6b, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:21:13 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x62ef52ae, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:21:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf00000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2335.297524] loop7: detected capacity change from 0 to 256 09:21:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) ioctl$HIDIOCGPHYS(r3, 0x80404812, &(0x7f0000000100)) [ 2335.342725] loop6: detected capacity change from 0 to 264192 [ 2335.363034] loop6: detected capacity change from 0 to 264192 [ 2335.380698] 9p: Unknown access argument À: -22 [ 2335.385756] loop5: detected capacity change from 0 to 264192 [ 2335.506333] 9p: Unknown access argument À: -22 09:21:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRES32, @ANYBLOB="419de1e2c1310d6ac05b803321d6ae309cc3ebe214d045e642a1241493ce7a33193df9229436d15b46457b341a5c5f5806dae3657ffb834fda42dd19a0a8bc58fa321eb76f790fe34eef84ea3da83d3acd8e7e3d0dfa7528730037da322e36008dcc3bbffcec2493d3200a1150888398ff3ca7b2823d69f556010050de6bada5bdde75b87df5134000"/152]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:21:25 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x500, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:21:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1100000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:21:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x200000000000000}, {0x0, 0x0, 0x10000}]) 09:21:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x68000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:21:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x43020000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:21:25 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:21:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa6c, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2348.150207] loop7: detected capacity change from 0 to 256 [ 2348.155870] loop6: detected capacity change from 0 to 264192 [ 2348.169359] loop5: detected capacity change from 0 to 264192 [ 2348.194339] loop7: detected capacity change from 0 to 256 [ 2348.204221] loop6: detected capacity change from 0 to 264192 [ 2348.214497] 9pnet_fd: Insufficient options for proto=fd 09:21:25 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:21:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x84800000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:21:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x300000000000000}, {0x0, 0x0, 0x10000}]) [ 2348.254833] 9pnet_fd: Insufficient options for proto=fd 09:21:26 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xaa6d, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:21:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1200000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2348.397362] loop5: detected capacity change from 0 to 264192 09:21:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2000000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:21:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x10000, 0xfffffffffffffffd, 0x0, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:21:38 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:21:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x400000000000000}, {0x0, 0x0, 0x10000}]) 09:21:38 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x511, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:21:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x6c000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:21:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0xedc0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:21:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8cffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2360.757159] loop5: detected capacity change from 0 to 264192 [ 2360.768254] loop6: detected capacity change from 0 to 264192 [ 2360.789809] loop6: detected capacity change from 0 to 264192 [ 2360.792858] loop7: detected capacity change from 0 to 256 09:21:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f00000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:21:38 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:21:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xa0ac0100, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2360.840149] loop5: detected capacity change from 0 to 264192 09:21:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x74000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2360.860482] loop7: detected capacity change from 0 to 256 09:21:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x80000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2360.948199] loop6: detected capacity change from 0 to 264192 [ 2360.969475] loop6: detected capacity change from 0 to 264192 09:21:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000002880), 0x4000101, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@initdev, @in6=@ipv4={""/10, ""/2, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={""/10, ""/2, @empty}}}, &(0x7f0000000140)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100), 0x1050000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_u}], [{@subj_role={'subj_role', 0x3d, '+-$\xad'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, '*^$:'}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@uid_gt={'uid>', r6}}, {@dont_appraise}, {@smackfsfloor={'smackfsfloor', 0x3d, '9p\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ff}}]}}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="4e119cbbb6a849bac0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:21:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x500000000000000}, {0x0, 0x0, 0x10000}]) 09:21:51 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x7a000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:21:51 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:21:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xb97f0100, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:21:51 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x600, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:21:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x1000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:21:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4000000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2374.211752] loop5: detected capacity change from 0 to 264192 [ 2374.236492] loop6: detected capacity change from 0 to 264192 09:21:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x46af010000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) [ 2374.268627] loop6: detected capacity change from 0 to 264192 [ 2374.295604] loop5: detected capacity change from 0 to 264192 [ 2374.300450] loop7: detected capacity change from 0 to 256 [ 2374.384174] loop7: detected capacity change from 0 to 256 [ 2374.428498] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2374.429167] Buffer I/O error on dev loop7, logical block 0, async page read [ 2374.429680] loop7: unable to read partition table [ 2374.431021] loop7: partition table beyond EOD, truncated 09:22:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4800000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:22:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000080)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:06 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x700, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:22:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x600000000000000}, {0x0, 0x0, 0x10000}]) 09:22:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x80010000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2388.745508] loop6: detected capacity change from 0 to 264192 09:22:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x2000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:22:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xc0ed0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:06 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x1123, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2388.776321] loop6: detected capacity change from 0 to 264192 09:22:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x3000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:22:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0x97ffffff, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2388.817208] 9p: Unknown access argument À: -22 [ 2388.842635] loop7: detected capacity change from 0 to 256 [ 2388.865417] loop5: detected capacity change from 0 to 264192 [ 2388.874788] loop6: detected capacity change from 0 to 264192 09:22:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x4000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2388.905331] loop7: detected capacity change from 0 to 256 [ 2388.915453] 9p: Unknown access argument Ày: -22 [ 2388.931783] loop6: detected capacity change from 0 to 264192 [ 2388.933850] 9p: Unknown access argument À: -22 09:22:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x700000000000000}, {0x0, 0x0, 0x10000}]) [ 2388.945605] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2388.946760] Buffer I/O error on dev loop6, logical block 0, async page read [ 2388.947824] loop6: unable to read partition table [ 2388.964535] loop6: partition table beyond EOD, truncated [ 2388.980622] 9p: Unknown access argument Ày: -22 09:22:06 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x1800, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:22:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4c00000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:22:06 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x900, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:22:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xae52ef62, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:22:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xe4ffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:06 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, @in_args={0x3}}, './file0\x00'}) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000002880), 0x4000101, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r4, 0x541c, &(0x7f0000000080)) [ 2389.052501] loop7: detected capacity change from 0 to 256 [ 2389.065372] loop6: detected capacity change from 0 to 264192 [ 2389.070334] 9p: Unknown access argument À: -22 09:22:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x1800000000000000}, {0x0, 0x0, 0x10000}]) [ 2389.097487] loop5: detected capacity change from 0 to 264192 09:22:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x5000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2389.144839] loop6: detected capacity change from 0 to 264192 09:22:06 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:22:19 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xc0010000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:22:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5500000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:22:19 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xa00, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:22:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3a088, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0xc) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x18, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e73bb5a0e7828a2ecd8973d66642c726600", @ANYRESHEX, @ANYBLOB="2c7766666e6f3de8eb90d1f85bb64d2656ed4917b38938e68c3d2c97c40f508045a10d1ef5392c6aca016e10bc98ec9c0100394cb18776257ef678f434a45bf7c700f6a51e42ac187870c2f0526ce64f991a9d5f5c2318d99cac39eb417c4a4a95f743a2105211b8f44b9fa30ddc6664f12c7a08e75626", @ANYRES16, @ANYRESHEX=r1]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:19 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:22:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x6000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2402.070899] loop7: detected capacity change from 0 to 256 09:22:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xf6ffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x1c00000000000000}, {0x0, 0x0, 0x10000}]) 09:22:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d177d896a55e588ec22b1c05033262da793dce586a2cdcefd6be8f03b0052dc660749e29ddc19852977709235a2130805f7b81aae3b0e8fd243074ea9b58444cd96a0ef18649e6c2683fd20e1fb234d6696ea8de67104917823c85b7d3b231838bf2d6a616e146c2ebdf5eebd444236e12def8e84a445131025eee844dd19d5e9f3", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) clone3(0xfffffffffffffffd, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2402.108624] loop7: detected capacity change from 0 to 256 [ 2402.117670] loop6: detected capacity change from 0 to 264192 [ 2402.143637] loop5: detected capacity change from 0 to 264192 09:22:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xffff0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2402.161678] loop6: detected capacity change from 0 to 264192 09:22:19 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xd00, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2402.179463] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2402.180171] Buffer I/O error on dev loop7, logical block 0, async page read [ 2402.180679] loop7: unable to read partition table [ 2402.184708] loop7: partition table beyond EOD, truncated [ 2402.215881] 9pnet_fd: Insufficient options for proto=fd 09:22:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x4000010000000000}, {0x0, 0x0, 0x10000}]) 09:22:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x7000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:22:19 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x2311, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2402.241637] 9pnet_fd: Insufficient options for proto=fd [ 2402.242712] loop7: detected capacity change from 0 to 256 [ 2402.293530] loop7: detected capacity change from 0 to 256 09:22:31 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x2500, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:22:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x6500000000000000}, {0x0, 0x0, 0x10000}]) 09:22:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) pread64(r2, &(0x7f0000000080)=""/23, 0x17, 0x758b) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xc1010000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:22:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x55aaffff00000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:22:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xffffff8c, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:31 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0xf00, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:22:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x9000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2414.010651] loop7: detected capacity change from 0 to 256 [ 2414.011739] loop6: detected capacity change from 0 to 264192 [ 2414.012512] 9p: Unknown access argument À: -22 09:22:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xffffffe4, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2414.042339] 9p: Unknown access argument À: -22 09:22:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x10000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2414.054741] loop5: detected capacity change from 0 to 264192 [ 2414.059629] loop6: detected capacity change from 0 to 264192 [ 2414.062735] loop7: detected capacity change from 0 to 256 09:22:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573731dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x8004000000000000}, {0x0, 0x0, 0x10000}]) 09:22:31 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x2c02, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:22:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xfffffff6, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x62ef52ae00000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:22:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xc8b10100, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:22:31 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x1100, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2414.275666] loop6: detected capacity change from 0 to 264192 [ 2414.279879] loop5: detected capacity change from 0 to 264192 [ 2414.303885] loop6: detected capacity change from 0 to 264192 09:22:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xc9ffffff, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:22:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6800000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:22:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2426.540177] loop6: detected capacity change from 0 to 264192 09:22:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8084ffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2426.542072] loop5: detected capacity change from 0 to 264192 [ 2426.557761] loop7: detected capacity change from 0 to 256 09:22:44 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x1105, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:22:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x19310000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:22:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0x8cffffff00000000}, {0x0, 0x0, 0x10000}]) 09:22:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2426.581801] loop7: detected capacity change from 0 to 256 [ 2426.591722] loop6: detected capacity change from 0 to 264192 09:22:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6c00000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:22:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xeffdffffffffffff}, {0x0, 0x0, 0x10000}]) 09:22:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0xedc000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:44 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x1200, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:22:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f0000002d80)=""/40, 0x28, 0x1ffffffffe) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0), 0x10000, &(0x7f0000003180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c776664eba23ea921a0de01f4b78457f13b6baae3b0894c82dccea8fa78ca8fe2accb61bcedb6ba2390da33f50c39d2ae4d", @ANYRESHEX, @ANYBLOB=',uname=,cache=none,aname=gretap0\x00,cachetag=,fscache,access=client,smackfsdef=,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b6673726f6f743d3f0000000000000000000000000000022c66736d616769633d3078666666666666666666666666666661322c646566636f6e746578743d726f6f742c736d61636b66736861743d646f6e745f61707072616973652c00"]) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x10000, 0x3) statx(r0, &(0x7f0000000400)='./file1\x00', 0x4000, 0x7ff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r3) fchownat(r2, &(0x7f0000000100)='./file0\x00', 0xee00, r3, 0x1000) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\t=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002c40)={&(0x7f0000000540), 0x6e, &(0x7f0000002b40)=[{&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000002dc0)=""/97, 0x61}, {&(0x7f00000006c0)=""/26, 0x1a}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000000700)=""/251, 0xfb}, {&(0x7f0000002980)=""/144, 0x90}, {&(0x7f0000000800)=""/112, 0x70}, {&(0x7f0000002a40)=""/210, 0xd2}], 0x9, &(0x7f0000002c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}, 0x40012020) fstat(r2, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000002e80)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001001000000005000000c34a0a006800650000622f907eac1414aaac1e0001940401008923efffffffffe0000001ac1414aaac1e0101ac1e0101ac14143ce0000001e0000002440c8981e00000010000041e441c1070000001010000bd9400000009000002d300000003000000030094040000"]}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000002f40)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7c, r6}) syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000002e40)='./file1\x00', 0x100000001, 0x2, &(0x7f0000000500)=[{&(0x7f0000000280)="0442f245552b3e020df23310b2672b5d57129f39f7930670172a2d6ed8d8aa3bf074ba36d9adfb79ffc6ba0dc1466742325b081299c2cd42a074e143d4efbc7f0302710b2d961a963624988cbd6d16617dd2c9d3e3fa83f81751f42eec17016b69aa6d0a090d2075199a12a2f96bfefe85c5c10cbd4abb8e7d749f7ce25eb3b1d8d683a34d468ccb66f451454ef813a3fe91ed165b4118ced266958eefb5400ad715bcd70f8c94ab09cfaccb0584e6b4e8be0d8ca0c40aa18ba69544507b9dfb75d20d7c4572e74a6fdcb9f963348e5d9f8e8a0a750fe464c887e994e3a315", 0xdf, 0x3ff}, {&(0x7f0000000440)="a1f5c404664c7f932c5f496053322157be9bb32167f47f601cf2209400db9d67797b7432de5633774361b97a9c79fb318c591644f7a9e9a612cc75a6795112be6a42802ed6b196820f10fe20f5ae08b162144e82a57ea8f1448090618cad7317db8f3f5170b212691fae856876face0e30b6ce7de9ddd07bcf9a95bba0a06ae2ae5516e55f6bcd", 0x87, 0x516}], 0x381005b, &(0x7f0000002c80)={[{}, {'^'}, {'9p\x00'}, {'#^:$+]]'}], [{@hash}, {@obj_type={'obj_type', 0x3d, '9p\x00'}}, {@uid_gt={'uid>', r4}}, {@uid_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x33, 0x38, 0x64, 0x37, 0x61, 0x66, 0x33], 0x2d, [0x30, 0x30, 0x36, 0x33], 0x2d, [0x34, 0x36, 0x35, 0x62], 0x2d, [0x62, 0x33, 0x32, 0x62], 0x2d, [0x35, 0x33, 0x30, 0x32, 0x66, 0x36, 0x0, 0x66]}}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@obj_user={'obj_user', 0x3d, '+!\\%'}}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x18}}, {@uid_eq={'uid', 0x3d, r5}}]}) syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000003000), &(0x7f0000003040)='./file0\x00', 0x10000, 0x3, &(0x7f0000003300)=[{&(0x7f0000003080)="00b6cc40841bab9cbad92a63b591a20ad7002009e34836a6f6c9f20795f710df35fe860e054268df9215677fa19265ea3aef61442c020b793d4e2b7a340270aab0119cf4af7b2b0c1af3c5f12695458135ef93b42a2ede54caab4cd9734149efb0d08bf7cf92b8125d4c59eb77b6a15c3a85b61adb49acf75f2c2e8296b9d301bac8a0cee9b374b337", 0x89, 0xfffffffffffff0a2}, {&(0x7f0000003140)="cd7399f1933c8a3b16dd75ff624ffca33fcdf3955de36fcf17ef7a009dd81d2e", 0x20, 0x1}, {&(0x7f00000032c0)="822ece2638c5f362aa04a7468e242a53e9012fa8c1", 0x15, 0x3}], 0x508020, &(0x7f0000003380)={[{@mode={'mode', 0x3d, 0x7}}, {@hide}, {@block={'block', 0x3d, 0x800}}, {@sbsector={'sbsector', 0x3d, 0x8}}, {@dmode={'dmode', 0x3d, 0x8001}}, {@cruft}, {@map_off}], [{@subj_type={'subj_type', 0x3d, '-%\xab[)%\xab/'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@appraise}]}) [ 2426.683896] loop5: detected capacity change from 0 to 264192 09:22:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xf6ffffff, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2426.702059] 9pnet_fd: Insufficient options for proto=fd 09:22:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) [ 2426.718756] loop7: detected capacity change from 0 to 256 [ 2426.755458] loop6: detected capacity change from 0 to 264192 [ 2426.762623] loop7: detected capacity change from 0 to 256 [ 2426.797880] loop6: detected capacity change from 0 to 264192 [ 2426.799738] 9pnet_fd: Insufficient options for proto=fd [ 2426.802787] 9p: Unknown access argument À: -22 09:22:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xf6ffffff00000000}, {0x0, 0x0, 0x10000}]) 09:22:57 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x4e00, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:22:57 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xf8000000, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:22:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x20100000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:22:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x1000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:57 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x2000, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:22:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_uid={'access', 0x3d, r3}}, {@msize={'msize', 0x3d, 0xffffffffffffffff}}, {@access_client}, {@version_u}, {@nodevmap}], [{@dont_hash}, {@appraise_type}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@audit}]}}) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000240)=ANY=[]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7400000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:22:57 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x6500, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2439.808569] loop5: detected capacity change from 0 to 264192 [ 2439.809410] loop7: detected capacity change from 0 to 256 [ 2439.822969] 9p: Unknown access argument À: -22 [ 2439.829334] loop7: detected capacity change from 0 to 256 [ 2439.844562] loop6: detected capacity change from 0 to 264192 09:22:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7a00000000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:22:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x8000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:22:57 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x2c01, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:22:57 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x8004, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:22:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x3f000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:22:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfcfdffff00000000}, {0x0, 0x0, 0x10000}]) [ 2439.927266] loop5: detected capacity change from 0 to 264192 [ 2439.957352] loop7: detected capacity change from 0 to 256 [ 2439.989136] loop6: detected capacity change from 0 to 264192 09:22:57 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x2d01, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2440.124282] loop7: detected capacity change from 0 to 256 09:23:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7fffffffffffffff, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:23:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x100000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:23:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x48000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:23:11 executing program 1: ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, &(0x7f0000000140)=0x1) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file1\x00') clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:23:11 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x3f00, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) 09:23:11 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:23:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfeffffff00000000}, {0x0, 0x0, 0x10000}]) 09:23:11 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xfcfdffff, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) 09:23:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x5, 0x0, 0x0, 0x2008002, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) [ 2454.018657] loop6: detected capacity change from 0 to 264192 [ 2454.050465] loop7: detected capacity change from 0 to 256 [ 2454.057530] loop6: detected capacity change from 0 to 264192 [ 2454.072132] loop5: detected capacity change from 0 to 264192 09:23:11 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0xff03, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) 09:23:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001f00)=[{0x0, 0x0, 0xfeffffffffffffff}, {0x0, 0x0, 0x10000}]) 09:23:11 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_read_part_table(0xfdfdffff, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000980)}, {0x0, 0x0, 0x10000}]) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2454.129590] loop7: detected capacity change from 0 to 256 09:23:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000240)={r2, 0x6, 0x7, 0x8}) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x200000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc079"]) syz_open_dev$vcsa(0x0, 0x0, 0x0) 09:23:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x87af010000000000, 0x1, &(0x7f0000001f00)=[{0x0, 0x0, 0x10000}]) 09:23:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x4c000000, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733dc0"]) 09:23:11 executing program 7: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000100)=@sha1={0x1, "fa88b7c8d886d1d54545d2845360478d23cd76db"}, 0x15, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) syz_read_part_table(0x4000, 0x2, &(0x7f0000001f00)=[{0x0}, {0x0, 0x0, 0x10000}]) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2271, 0x0) [ 2454.237641] loop6: detected capacity change from 0 to 264192 09:23:11 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x1b0be, 0x0, 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x6d]}}]}) [ 2454.297251] loop5: detected capacity change from 0 to 264192 [ 2454.329869] loop7: detected capacity change from 0 to 256 [ 2454.366543] loop6: detected capacity change from 0 to 264192 [ 2454.381782] loop7: detected capacity change from 0 to 256 VM DIAGNOSIS: 09:28:15 Registers: info registers vcpu 0 RAX=000000000099c8f1 RBX=0000000000000000 RCX=ffffffff844e28be RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff81288115 RBP=dffffc0000000000 RSP=ffffffff85407e10 R8 =0000000000000001 R9 =ffffed100d9c69f8 R10=ffff88806ce34fc3 R11=0000000000000001 R12=ffffffff85d38210 R13=1ffffffff0a80fc7 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff844e384f RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055a836a4f618 CR3=000000000e294000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000080000000000000008 XMM02=fcb2951c54fc8e6ebb7afc732696f5fc XMM03=00000606060202020602080171e6d5f7 XMM04=70a696fc0801039aff39007702fe016c XMM05=b02e8bf5fc4e9be69cfcf4dbd5f7fcf7 XMM06=fcb2951c54fc8e6ebb7afc732696f5fc XMM07=00000606060202020602080171e6d5f7 XMM08=69646e616320636578650e006e656720 XMM09=73746e696820636578650a0065746164 XMM10=786511006c61746f7420636578650a00 XMM11=00737472617473657220726f74756365 XMM12=636578650b007a7a7566206365786509 XMM13=696d20636578650d0065676169727420 XMM14=616d7320636578650a00657a696d696e XMM15=0000736465657320636578650a006873 info registers vcpu 1 RAX=0000000000b374a3 RBX=0000000000000001 RCX=ffffffff844e28be RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff81288115 RBP=dffffc0000000000 RSP=ffff888008e2fe70 R8 =0000000000000001 R9 =ffffed100d9e69f8 R10=ffff88806cf34fc3 R11=0000000000000001 R12=ffffffff85d38210 R13=1ffff110011c5fd3 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff844e384f RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000000c0069bb028 CR3=000000000e294000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004183fd3bc0000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000