00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:08:25 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1309.420514] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:08:25 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x3a02000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:08:25 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 87)
[ 1309.447189] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1309.447868] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1309.508428] loop3: detected capacity change from 0 to 512
[ 1309.512581] loop5: detected capacity change from 0 to 512
[ 1309.558819] loop2: detected capacity change from 0 to 512
[ 1309.563059] EXT4-fs error (device loop3): __ext4_fill_super:5513: inode #2: comm syz-executor.3: iget: special inode unallocated
[ 1309.571579] EXT4-fs (loop3): get root inode failed
[ 1309.572416] EXT4-fs (loop3): mount failed
[ 1309.589261] EXT4-fs (loop5): corrupt root inode, run e2fsck
[ 1309.590461] EXT4-fs (loop5): mount failed
[ 1309.638739] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1309.711352] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:08:35 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x10}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:08:35 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x3f00000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:08:35 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
lsetxattr$security_capability(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x60, 0x8}, {0x1f, 0x1}]}, 0x14, 0x2)
lseek(r1, 0x0, 0x3)
05:08:35 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:08:35 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 88)
05:08:35 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:08:35 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xd, 0x0})
05:08:35 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1319.646875] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1319.647574] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:08:35 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x600, 0x0})
[ 1319.701984] loop5: detected capacity change from 0 to 512
[ 1319.706405] loop2: detected capacity change from 0 to 512
[ 1319.710506] loop3: detected capacity change from 0 to 512
[ 1319.720437] EXT4-fs (loop5): corrupt root inode, run e2fsck
[ 1319.720954] EXT4-fs (loop5): mount failed
[ 1319.757309] EXT4-fs error (device loop3): __ext4_fill_super:5513: inode #2: comm syz-executor.3: iget: special inode unallocated
05:08:35 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:08:35 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1319.788423] EXT4-fs (loop3): get root inode failed
[ 1319.789295] EXT4-fs (loop3): mount failed
[ 1319.792495] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1319.793704] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:08:35 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x4000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1319.860675] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:08:35 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x900, 0x0})
05:08:36 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1319.927517] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1319.928213] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1319.930605] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1319.935164] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1319.935833] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1319.945578] loop5: detected capacity change from 0 to 512
[ 1319.966005] EXT4-fs (loop5): corrupt root inode, run e2fsck
[ 1319.966549] EXT4-fs (loop5): mount failed
05:08:36 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xd00, 0x0})
05:08:36 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1320.070826] loop3: detected capacity change from 0 to 512
[ 1320.075733] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1320.076412] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1320.108599] EXT4-fs error (device loop3): __ext4_fill_super:5513: inode #2: comm syz-executor.3: iget: special inode unallocated
[ 1320.113136] EXT4-fs (loop3): get root inode failed
[ 1320.113645] EXT4-fs (loop3): mount failed
05:08:47 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xf0}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:08:47 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
lsetxattr$security_capability(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x60, 0x8}, {0x1f, 0x1}]}, 0x14, 0x2)
lseek(r1, 0x0, 0x3)
05:08:47 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x8402000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:08:47 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:08:47 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 89)
05:08:47 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004000400", 0x1e, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:08:47 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x2000, 0x0})
05:08:47 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:08:47 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 90)
[ 1331.892059] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1331.893276] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1331.901247] FAULT_INJECTION: forcing a failure.
[ 1331.901247] name failslab, interval 1, probability 0, space 0, times 0
[ 1331.902896] CPU: 0 UID: 0 PID: 17440 Comm: syz-executor.6 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1331.902920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1331.902931] Call Trace:
[ 1331.902938]
[ 1331.902946] dump_stack_lvl+0xfa/0x120
[ 1331.902978] should_fail_ex+0x4d7/0x5e0
[ 1331.903014] ? anon_vma_fork+0xe6/0x630
[ 1331.903035] should_failslab+0xc2/0x120
[ 1331.903057] kmem_cache_alloc_noprof+0x80/0x690
[ 1331.903081] ? anon_vma_clone+0x3be/0x570
[ 1331.903126] ? anon_vma_fork+0xe6/0x630
[ 1331.903144] anon_vma_fork+0xe6/0x630
[ 1331.903165] ? vm_area_dup+0x3e7/0x6f0
[ 1331.903199] dup_mmap+0x11f8/0x1d00
[ 1331.903249] ? __pfx_dup_mmap+0x10/0x10
[ 1331.903302] ? lock_is_held_type+0x9e/0x120
[ 1331.903338] copy_process+0x632b/0x72a0
[ 1331.903366] ? __pfx_perf_trace_lock+0x10/0x10
[ 1331.903426] ? __pfx_copy_process+0x10/0x10
[ 1331.903454] ? __might_fault+0xe0/0x190
[ 1331.903495] ? _copy_from_user+0x5b/0xd0
[ 1331.903530] kernel_clone+0xea/0x7f0
[ 1331.903552] ? get_pid_task+0xfd/0x250
[ 1331.903579] ? __pfx_kernel_clone+0x10/0x10
[ 1331.903647] __do_sys_clone3+0x1f5/0x280
[ 1331.903671] ? __pfx___do_sys_clone3+0x10/0x10
[ 1331.903696] ? perf_trace_lock+0xbc/0x5f0
[ 1331.903750] ? lock_acquire+0x15e/0x2f0
[ 1331.903781] ? __pfx_perf_trace_lock+0x10/0x10
[ 1331.903808] ? __might_fault+0x138/0x190
[ 1331.903835] ? lock_release+0xc8/0x290
[ 1331.903863] ? __might_fault+0xe0/0x190
[ 1331.903891] ? find_held_lock+0x2b/0x80
[ 1331.903913] ? syscall_trace_enter+0x1cf/0x240
[ 1331.903941] ? lock_release+0xc8/0x290
[ 1331.903987] do_syscall_64+0xbf/0x430
[ 1331.904015] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1331.904032] RIP: 0033:0x7f9541d78b19
[ 1331.904046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1331.904063] RSP: 002b:00007f953f2ee188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3
[ 1331.904079] RAX: ffffffffffffffda RBX: 00007f9541e8bf60 RCX: 00007f9541d78b19
[ 1331.904090] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000040
[ 1331.904100] RBP: 00007f953f2ee1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1331.904110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1331.904120] R13: 00007ffdfbaf907f R14: 00007f953f2ee300 R15: 0000000000022000
[ 1331.904169]
[ 1331.934487] loop2: detected capacity change from 0 to 512
[ 1331.936645] loop3: detected capacity change from 0 to 512
[ 1331.939216] loop5: detected capacity change from 0 to 512
[ 1331.991748] EXT4-fs (loop3): corrupt root inode, run e2fsck
[ 1331.993648] EXT4-fs (loop3): mount failed
05:08:48 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x28a}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:08:48 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xfdfd, 0x0})
[ 1332.031448] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1332.037791] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:08:48 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 91)
05:08:48 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:08:48 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x881a000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1332.125497] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1332.126265] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:08:48 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1332.139438] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1332.140184] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1332.143550] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1332.170994] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1332.234873] loop3: detected capacity change from 0 to 512
[ 1332.245928] loop5: detected capacity change from 0 to 512
[ 1332.267450] EXT4-fs (loop3): corrupt root inode, run e2fsck
[ 1332.268678] EXT4-fs (loop3): mount failed
[ 1332.289629] EXT4-fs (loop5): corrupt root inode, run e2fsck
[ 1332.291524] EXT4-fs (loop5): mount failed
05:08:59 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x300}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:08:59 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x80000, 0x0})
05:08:59 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
lsetxattr$security_capability(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x60, 0x8}, {0x1f, 0x1}]}, 0x14, 0x2)
05:08:59 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xa202000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:08:59 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 92)
05:08:59 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:08:59 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:08:59 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1343.796901] loop2: detected capacity change from 0 to 512
[ 1343.805575] loop5: detected capacity change from 0 to 512
[ 1343.812942] loop3: detected capacity change from 0 to 512
[ 1343.813212] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1343.814850] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1343.827318] FAULT_INJECTION: forcing a failure.
[ 1343.827318] name failslab, interval 1, probability 0, space 0, times 0
[ 1343.828215] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1343.828905] CPU: 0 UID: 0 PID: 17682 Comm: syz-executor.6 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1343.828932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1343.828944] Call Trace:
[ 1343.828951]
[ 1343.828959] dump_stack_lvl+0xfa/0x120
[ 1343.828999] should_fail_ex+0x4d7/0x5e0
[ 1343.829032] ? anon_vma_fork+0x1f4/0x630
[ 1343.829055] should_failslab+0xc2/0x120
[ 1343.829084] kmem_cache_alloc_noprof+0x80/0x690
[ 1343.829117] ? anon_vma_clone+0x3be/0x570
[ 1343.829165] ? anon_vma_fork+0x1f4/0x630
[ 1343.829185] anon_vma_fork+0x1f4/0x630
[ 1343.829225] dup_mmap+0x11f8/0x1d00
[ 1343.829285] ? __pfx_dup_mmap+0x10/0x10
[ 1343.829303] ? _raw_spin_unlock_irqrestore+0x2c/0x50
[ 1343.829375] ? lock_is_held_type+0x9e/0x120
[ 1343.829419] copy_process+0x632b/0x72a0
[ 1343.829451] ? __pfx_perf_trace_lock+0x10/0x10
[ 1343.829536] ? __pfx_copy_process+0x10/0x10
[ 1343.829565] ? __might_fault+0xe0/0x190
[ 1343.829614] ? _copy_from_user+0x5b/0xd0
[ 1343.829653] kernel_clone+0xea/0x7f0
[ 1343.829681] ? get_pid_task+0xfd/0x250
[ 1343.829713] ? __pfx_kernel_clone+0x10/0x10
[ 1343.829792] __do_sys_clone3+0x1f5/0x280
[ 1343.829821] ? __pfx___do_sys_clone3+0x10/0x10
[ 1343.829850] ? perf_trace_lock+0xbc/0x5f0
[ 1343.829918] ? lock_acquire+0x15e/0x2f0
[ 1343.829956] ? __pfx_perf_trace_lock+0x10/0x10
[ 1343.829987] ? __might_fault+0x138/0x190
[ 1343.830024] ? lock_release+0xc8/0x290
[ 1343.830056] ? __might_fault+0xe0/0x190
[ 1343.830087] ? find_held_lock+0x2b/0x80
[ 1343.830115] ? syscall_trace_enter+0x1cf/0x240
[ 1343.830146] ? lock_release+0xc8/0x290
[ 1343.830205] do_syscall_64+0xbf/0x430
[ 1343.830235] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1343.830255] RIP: 0033:0x7f9541d78b19
[ 1343.830272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1343.830292] RSP: 002b:00007f953f2ee188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3
[ 1343.830309] RAX: ffffffffffffffda RBX: 00007f9541e8bf60 RCX: 00007f9541d78b19
[ 1343.830322] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000040
[ 1343.830333] RBP: 00007f953f2ee1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1343.830344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1343.830359] R13: 00007ffdfbaf907f R14: 00007f953f2ee300 R15: 0000000000022000
[ 1343.830413]
[ 1343.860874] EXT4-fs (loop3): corrupt root inode, run e2fsck
[ 1343.861419] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1343.874838] EXT4-fs (loop3): mount failed
[ 1343.898057] EXT4-fs (loop5): corrupt root inode, run e2fsck
05:08:59 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x900}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:08:59 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 93)
[ 1343.906513] EXT4-fs (loop5): mount failed
05:09:00 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x1000000, 0x0})
05:09:00 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1344.022343] loop3: detected capacity change from 0 to 512
[ 1344.033253] EXT4-fs error (device loop3): __ext4_fill_super:5513: inode #2: comm syz-executor.3: iget: special inode unallocated
[ 1344.035492] EXT4-fs (loop3): get root inode failed
[ 1344.036049] EXT4-fs (loop3): mount failed
[ 1344.036045] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:09:00 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:09:00 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:00 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1344.118544] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1344.119353] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:09:00 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:00 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1344.217082] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:09:00 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xf400000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1344.254517] loop3: detected capacity change from 0 to 512
[ 1344.257914] loop5: detected capacity change from 0 to 512
[ 1344.285527] EXT4-fs error (device loop3): __ext4_fill_super:5513: inode #2: comm syz-executor.3: iget: special inode unallocated
[ 1344.289965] EXT4-fs (loop3): get root inode failed
[ 1344.290695] EXT4-fs (loop3): mount failed
[ 1344.305554] loop2: detected capacity change from 0 to 512
[ 1344.309974] EXT4-fs (loop5): corrupt root inode, run e2fsck
[ 1344.318488] EXT4-fs (loop5): mount failed
[ 1344.408271] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1344.476523] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:09:16 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x2000000, 0x0})
05:09:16 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:16 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
lsetxattr$security_capability(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x60, 0x8}, {0x1f, 0x1}]}, 0x14, 0x2)
05:09:16 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:16 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xff9fad921f7f0000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:09:16 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:16 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 94)
05:09:16 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1359.995236] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1359.996720] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:09:16 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x3e44}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1360.037786] loop5: detected capacity change from 0 to 512
[ 1360.042424] FAULT_INJECTION: forcing a failure.
[ 1360.042424] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 1360.043700] CPU: 1 UID: 0 PID: 17936 Comm: syz-executor.6 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1360.043718] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1360.043727] Call Trace:
[ 1360.043732]
[ 1360.043738] dump_stack_lvl+0xfa/0x120
[ 1360.043765] should_fail_ex+0x4d7/0x5e0
[ 1360.043791] should_fail_alloc_page+0xe0/0x110
[ 1360.043812] prepare_alloc_pages+0x1eb/0x550
[ 1360.043840] __alloc_frozen_pages_noprof+0x17f/0x1f10
[ 1360.043861] ? tracing_gen_ctx_irq_test+0x167/0x1f0
[ 1360.043877] ? perf_swevent_event+0x63/0x3f0
[ 1360.043904] ? perf_tp_event+0x807/0xe70
[ 1360.043936] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10
[ 1360.043984] ? perf_trace_lock_acquire+0x3c9/0x710
[ 1360.044010] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 1360.044033] ? policy_nodemask+0xeb/0x4e0
[ 1360.044060] alloc_pages_mpol+0xed/0x340
[ 1360.044081] ? __pfx_alloc_pages_mpol+0x10/0x10
[ 1360.044098] ? __pfx_perf_trace_lock+0x10/0x10
[ 1360.044141] alloc_pages_noprof+0x9d/0x180
[ 1360.044167] __pud_alloc+0x3f/0x830
[ 1360.044192] copy_page_range+0x2bca/0x4360
[ 1360.044208] ? perf_trace_run_bpf_submit+0xef/0x180
[ 1360.044240] ? perf_trace_lock_acquire+0x3c9/0x710
[ 1360.044278] ? lock_is_held_type+0x9e/0x120
[ 1360.044311] ? __pfx___sanitizer_cov_trace_const_cmp4+0x6/0x10
[ 1360.044332] ? __pfx_copy_page_range+0x10/0x10
[ 1360.044360] ? mas_store+0x17f/0x770
[ 1360.044385] ? __pfx_mas_store+0x10/0x10
[ 1360.044402] ? lock_release+0xc8/0x290
[ 1360.044446] ? lock_is_held_type+0x9e/0x120
[ 1360.044470] dup_mmap+0xd27/0x1d00
[ 1360.044510] ? __pfx_dup_mmap+0x10/0x10
[ 1360.044523] ? _raw_spin_unlock_irqrestore+0x2c/0x50
[ 1360.044571] ? lock_is_held_type+0x9e/0x120
[ 1360.044598] copy_process+0x632b/0x72a0
[ 1360.044620] ? __pfx_perf_trace_lock+0x10/0x10
[ 1360.044666] ? __pfx_copy_process+0x10/0x10
[ 1360.044686] ? __might_fault+0xe0/0x190
[ 1360.044718] ? _copy_from_user+0x5b/0xd0
[ 1360.044746] kernel_clone+0xea/0x7f0
[ 1360.044764] ? get_pid_task+0xfd/0x250
[ 1360.044785] ? __pfx_kernel_clone+0x10/0x10
[ 1360.044840] __do_sys_clone3+0x1f5/0x280
[ 1360.044859] ? __pfx___do_sys_clone3+0x10/0x10
[ 1360.044878] ? perf_trace_lock+0xbc/0x5f0
[ 1360.044920] ? lock_acquire+0x15e/0x2f0
[ 1360.044944] ? __pfx_perf_trace_lock+0x10/0x10
[ 1360.044966] ? __might_fault+0x138/0x190
[ 1360.044986] ? lock_release+0xc8/0x290
[ 1360.045008] ? __might_fault+0xe0/0x190
[ 1360.045029] ? find_held_lock+0x2b/0x80
[ 1360.045045] ? syscall_trace_enter+0x1cf/0x240
[ 1360.045068] ? lock_release+0xc8/0x290
[ 1360.045103] do_syscall_64+0xbf/0x430
[ 1360.045125] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1360.045138] RIP: 0033:0x7f9541d78b19
[ 1360.045149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1360.045162] RSP: 002b:00007f953f2ee188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3
[ 1360.045175] RAX: ffffffffffffffda RBX: 00007f9541e8bf60 RCX: 00007f9541d78b19
[ 1360.045183] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000040
[ 1360.045191] RBP: 00007f953f2ee1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1360.045199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1360.045206] R13: 00007ffdfbaf907f R14: 00007f953f2ee300 R15: 0000000000022000
[ 1360.045244]
[ 1360.071889] loop2: detected capacity change from 0 to 512
05:09:16 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x6000000, 0x0})
[ 1360.110964] loop3: detected capacity change from 0 to 512
[ 1360.131813] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1360.132482] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1360.144335] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1360.145885] EXT4-fs (loop3): group descriptors corrupted!
[ 1360.146907] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1360.159966] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1360.237555] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1360.242694] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:09:27 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x3f00}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:09:27 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xffefff1f00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:09:27 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:27 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x8000000, 0x0})
05:09:27 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:27 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:27 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 95)
05:09:27 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
[ 1371.138182] loop2: detected capacity change from 0 to 512
[ 1371.144250] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1371.145663] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1371.184746] loop3: detected capacity change from 0 to 512
[ 1371.196471] FAULT_INJECTION: forcing a failure.
[ 1371.196471] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 1371.198583] CPU: 0 UID: 0 PID: 18094 Comm: syz-executor.6 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1371.198618] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1371.198634] Call Trace:
[ 1371.198644]
[ 1371.198656] dump_stack_lvl+0xfa/0x120
[ 1371.198703] should_fail_ex+0x4d7/0x5e0
[ 1371.198751] should_fail_alloc_page+0xe0/0x110
[ 1371.198791] prepare_alloc_pages+0x1eb/0x550
[ 1371.198846] __alloc_frozen_pages_noprof+0x17f/0x1f10
[ 1371.198884] ? tracing_gen_ctx_irq_test+0x167/0x1f0
[ 1371.198958] ? perf_trace_run_bpf_submit+0xef/0x180
[ 1371.199004] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10
[ 1371.199071] ? perf_trace_lock_acquire+0x3c9/0x710
[ 1371.199154] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 1371.199198] ? policy_nodemask+0xeb/0x4e0
[ 1371.199251] alloc_pages_mpol+0xed/0x340
[ 1371.199293] ? __pfx_alloc_pages_mpol+0x10/0x10
[ 1371.199337] ? find_held_lock+0x2b/0x80
[ 1371.199371] ? __pud_alloc+0x59e/0x830
[ 1371.199418] alloc_pages_noprof+0x9d/0x180
[ 1371.199466] __pmd_alloc+0x3b/0xad0
[ 1371.199513] copy_page_range+0x29ab/0x4360
[ 1371.199545] ? perf_trace_run_bpf_submit+0xef/0x180
[ 1371.199609] ? perf_trace_lock_acquire+0x3c9/0x710
[ 1371.199685] ? lock_is_held_type+0x9e/0x120
[ 1371.199750] ? __pfx___sanitizer_cov_trace_const_cmp4+0x6/0x10
[ 1371.199792] ? __pfx_copy_page_range+0x10/0x10
[ 1371.199847] ? mas_store+0x17f/0x770
[ 1371.199895] ? __pfx_mas_store+0x10/0x10
[ 1371.199927] ? lock_release+0xc8/0x290
[ 1371.200014] ? lock_is_held_type+0x9e/0x120
[ 1371.200059] dup_mmap+0xd27/0x1d00
[ 1371.200138] ? __pfx_dup_mmap+0x10/0x10
[ 1371.200164] ? _raw_spin_unlock_irqrestore+0x2c/0x50
[ 1371.200259] ? lock_is_held_type+0x9e/0x120
[ 1371.200313] copy_process+0x632b/0x72a0
[ 1371.200359] ? __pfx_perf_trace_lock+0x10/0x10
[ 1371.200451] ? __pfx_copy_process+0x10/0x10
[ 1371.200491] ? __might_fault+0xe0/0x190
[ 1371.200553] ? _copy_from_user+0x5b/0xd0
[ 1371.200607] kernel_clone+0xea/0x7f0
[ 1371.200640] ? get_pid_task+0xfd/0x250
[ 1371.200681] ? __pfx_kernel_clone+0x10/0x10
[ 1371.200789] __do_sys_clone3+0x1f5/0x280
[ 1371.200826] ? __pfx___do_sys_clone3+0x10/0x10
[ 1371.200863] ? perf_trace_lock+0xbc/0x5f0
[ 1371.200948] ? lock_acquire+0x15e/0x2f0
[ 1371.200957] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1371.200994] ? __pfx_perf_trace_lock+0x10/0x10
[ 1371.201039] ? __might_fault+0x138/0x190
[ 1371.201083] ? lock_release+0xc8/0x290
[ 1371.201128] ? __might_fault+0xe0/0x190
[ 1371.201172] ? find_held_lock+0x2b/0x80
[ 1371.201207] ? syscall_trace_enter+0x1cf/0x240
[ 1371.201251] ? lock_release+0xc8/0x290
[ 1371.201325] do_syscall_64+0xbf/0x430
[ 1371.201369] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1371.201396] RIP: 0033:0x7f9541d78b19
[ 1371.201419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1371.201445] RSP: 002b:00007f953f2ee188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3
[ 1371.201470] RAX: ffffffffffffffda RBX: 00007f9541e8bf60 RCX: 00007f9541d78b19
[ 1371.201488] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000040
[ 1371.201504] RBP: 00007f953f2ee1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1371.201521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1371.201536] R13: 00007ffdfbaf907f R14: 00007f953f2ee300 R15: 0000000000022000
[ 1371.201617]
[ 1371.205078] loop5: detected capacity change from 0 to 512
[ 1371.264311] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1371.268031] EXT4-fs (loop3): group descriptors corrupted!
05:09:27 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:09:27 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x9000000, 0x0})
[ 1371.332368] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:09:27 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1371.360630] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1371.362016] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1371.365209] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1371.366578] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1371.374586] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:09:27 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xd000000, 0x0})
[ 1371.424221] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1371.425781] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:09:27 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xffffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:09:27 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 96)
05:09:27 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x20000000, 0x0})
05:09:27 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x443e}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1371.499301] loop2: detected capacity change from 0 to 512
[ 1371.550283] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1371.555940] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1371.591069] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1371.592046] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1371.612191] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1371.613168] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1371.641759] FAULT_INJECTION: forcing a failure.
[ 1371.641759] name failslab, interval 1, probability 0, space 0, times 0
[ 1371.643356] CPU: 1 UID: 0 PID: 18193 Comm: syz-executor.6 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1371.643380] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1371.643391] Call Trace:
[ 1371.643398]
[ 1371.643406] dump_stack_lvl+0xfa/0x120
[ 1371.643439] should_fail_ex+0x4d7/0x5e0
[ 1371.643471] ? anon_vma_fork+0xe6/0x630
[ 1371.643493] should_failslab+0xc2/0x120
[ 1371.643516] kmem_cache_alloc_noprof+0x80/0x690
[ 1371.643541] ? anon_vma_clone+0x3be/0x570
[ 1371.643583] ? anon_vma_fork+0xe6/0x630
[ 1371.643603] anon_vma_fork+0xe6/0x630
[ 1371.643625] ? vm_area_dup+0x3e7/0x6f0
[ 1371.643661] dup_mmap+0x11f8/0x1d00
[ 1371.643715] ? __pfx_dup_mmap+0x10/0x10
[ 1371.643732] ? _raw_spin_unlock_irqrestore+0x2c/0x50
[ 1371.643798] ? lock_is_held_type+0x9e/0x120
[ 1371.643836] copy_process+0x632b/0x72a0
[ 1371.643865] ? __pfx_perf_trace_lock+0x10/0x10
[ 1371.643930] ? __pfx_copy_process+0x10/0x10
[ 1371.643957] ? __might_fault+0xe0/0x190
[ 1371.643999] ? _copy_from_user+0x5b/0xd0
[ 1371.644036] kernel_clone+0xea/0x7f0
[ 1371.644059] ? get_pid_task+0xfd/0x250
[ 1371.644088] ? __pfx_kernel_clone+0x10/0x10
[ 1371.644167] __do_sys_clone3+0x1f5/0x280
[ 1371.644194] ? __pfx___do_sys_clone3+0x10/0x10
[ 1371.644220] ? perf_trace_lock+0xbc/0x5f0
[ 1371.644278] ? lock_acquire+0x15e/0x2f0
[ 1371.644311] ? __pfx_perf_trace_lock+0x10/0x10
[ 1371.644340] ? __might_fault+0x138/0x190
[ 1371.644369] ? lock_release+0xc8/0x290
[ 1371.644399] ? __might_fault+0xe0/0x190
[ 1371.644430] ? find_held_lock+0x2b/0x80
[ 1371.644453] ? syscall_trace_enter+0x1cf/0x240
[ 1371.644484] ? lock_release+0xc8/0x290
[ 1371.644534] do_syscall_64+0xbf/0x430
[ 1371.644563] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1371.644582] RIP: 0033:0x7f9541d78b19
[ 1371.644597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1371.644615] RSP: 002b:00007f953f2ee188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3
[ 1371.644632] RAX: ffffffffffffffda RBX: 00007f9541e8bf60 RCX: 00007f9541d78b19
[ 1371.644644] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000040
[ 1371.644655] RBP: 00007f953f2ee1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1371.644665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1371.644676] R13: 00007ffdfbaf907f R14: 00007f953f2ee300 R15: 0000000000022000
[ 1371.644728]
[ 1371.698646] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:09:37 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:37 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x7fffdff0, 0x0})
05:09:37 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:37 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:37 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
05:09:37 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 97)
05:09:37 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x60ff}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:09:37 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1381.789512] loop5: detected capacity change from 0 to 512
[ 1381.793965] loop2: detected capacity change from 0 to 512
[ 1381.805545] EXT4-fs (loop5): corrupt root inode, run e2fsck
[ 1381.806066] EXT4-fs (loop5): mount failed
[ 1381.825520] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:09:37 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1381.884175] loop3: detected capacity change from 0 to 512
[ 1381.886214] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1381.887474] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1381.986507] loop5: detected capacity change from 0 to 512
[ 1381.994228] EXT4-fs (loop5): corrupt root inode, run e2fsck
[ 1381.994741] EXT4-fs (loop5): mount failed
[ 1381.997069] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1381.997807] EXT4-fs (loop3): group descriptors corrupted!
05:09:38 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x8a02}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:09:38 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1382.035448] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:09:38 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xf0dfff7f, 0x0})
05:09:38 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:38 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:38 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1382.154654] loop5: detected capacity change from 0 to 512
05:09:38 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xf000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1382.175269] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1382.176644] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1382.190987] EXT4-fs (loop5): corrupt root inode, run e2fsck
[ 1382.193582] EXT4-fs (loop5): mount failed
[ 1382.270387] loop3: detected capacity change from 0 to 512
05:09:38 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1382.320302] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1382.322078] EXT4-fs (loop3): group descriptors corrupted!
05:09:38 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xf5ffffff, 0x0})
05:09:38 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:38 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 98)
[ 1382.497642] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1382.498980] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1382.516707] loop5: detected capacity change from 0 to 512
[ 1382.567470] FAULT_INJECTION: forcing a failure.
[ 1382.567470] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 1382.569291] CPU: 1 UID: 0 PID: 18458 Comm: syz-executor.6 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1382.569323] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1382.569338] Call Trace:
[ 1382.569348]
[ 1382.569359] dump_stack_lvl+0xfa/0x120
[ 1382.569403] should_fail_ex+0x4d7/0x5e0
[ 1382.569449] should_fail_alloc_page+0xe0/0x110
[ 1382.569487] prepare_alloc_pages+0x1eb/0x550
[ 1382.569538] __alloc_frozen_pages_noprof+0x17f/0x1f10
[ 1382.569573] ? tracing_gen_ctx_irq_test+0x167/0x1f0
[ 1382.569641] ? perf_trace_run_bpf_submit+0xef/0x180
[ 1382.569683] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10
[ 1382.569744] ? perf_trace_lock_acquire+0x3c9/0x710
[ 1382.569816] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 1382.569856] ? policy_nodemask+0xeb/0x4e0
[ 1382.569907] alloc_pages_mpol+0xed/0x340
[ 1382.569946] ? __pfx_alloc_pages_mpol+0x10/0x10
[ 1382.570002] ? find_held_lock+0x2b/0x80
[ 1382.570034] ? __pud_alloc+0x59e/0x830
[ 1382.570078] alloc_pages_noprof+0x9d/0x180
[ 1382.570128] __pmd_alloc+0x3b/0xad0
[ 1382.570172] copy_page_range+0x29ab/0x4360
[ 1382.570202] ? perf_trace_run_bpf_submit+0xef/0x180
[ 1382.570260] ? perf_trace_lock_acquire+0x3c9/0x710
[ 1382.570332] ? lock_is_held_type+0x9e/0x120
[ 1382.570393] ? __pfx___sanitizer_cov_trace_const_cmp4+0x6/0x10
[ 1382.570431] ? __pfx_copy_page_range+0x10/0x10
[ 1382.570481] ? mas_store+0x17f/0x770
[ 1382.570527] ? __pfx_mas_store+0x10/0x10
[ 1382.570558] ? lock_release+0xc8/0x290
[ 1382.570642] ? lock_is_held_type+0x9e/0x120
[ 1382.570684] dup_mmap+0xd27/0x1d00
[ 1382.570756] ? __pfx_dup_mmap+0x10/0x10
[ 1382.570780] ? _raw_spin_unlock_irqrestore+0x2c/0x50
[ 1382.570874] ? lock_is_held_type+0x9e/0x120
[ 1382.570923] copy_process+0x632b/0x72a0
[ 1382.570962] ? __pfx_perf_trace_lock+0x10/0x10
[ 1382.571047] ? __pfx_copy_process+0x10/0x10
[ 1382.571084] ? __might_fault+0xe0/0x190
[ 1382.571142] ? _copy_from_user+0x5b/0xd0
[ 1382.571192] kernel_clone+0xea/0x7f0
[ 1382.571223] ? get_pid_task+0xfd/0x250
[ 1382.571261] ? __pfx_kernel_clone+0x10/0x10
[ 1382.571364] __do_sys_clone3+0x1f5/0x280
[ 1382.571400] ? __pfx___do_sys_clone3+0x10/0x10
[ 1382.571434] ? perf_trace_lock+0xbc/0x5f0
[ 1382.571519] ? lock_acquire+0x15e/0x2f0
[ 1382.571565] ? __pfx_perf_trace_lock+0x10/0x10
[ 1382.571606] ? __might_fault+0x138/0x190
[ 1382.571642] ? lock_release+0xc8/0x290
[ 1382.571682] ? __might_fault+0xe0/0x190
[ 1382.571721] ? find_held_lock+0x2b/0x80
[ 1382.571751] ? syscall_trace_enter+0x1cf/0x240
[ 1382.571790] ? lock_release+0xc8/0x290
[ 1382.571854] do_syscall_64+0xbf/0x430
[ 1382.571893] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1382.571916] RIP: 0033:0x7f9541d78b19
[ 1382.571936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1382.571959] RSP: 002b:00007f953f2ee188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3
[ 1382.571981] RAX: ffffffffffffffda RBX: 00007f9541e8bf60 RCX: 00007f9541d78b19
[ 1382.571997] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000040
[ 1382.572011] RBP: 00007f953f2ee1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1382.572025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1382.572039] R13: 00007ffdfbaf907f R14: 00007f953f2ee300 R15: 0000000000022000
[ 1382.572108]
[ 1382.626498] EXT4-fs error (device loop5): __ext4_fill_super:5513: inode #2: comm syz-executor.5: iget: special inode unallocated
[ 1382.628945] EXT4-fs (loop5): get root inode failed
[ 1382.629782] EXT4-fs (loop5): mount failed
05:09:50 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:09:50 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:50 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:50 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xf6ffffff, 0x0})
05:09:50 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:50 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 99)
05:09:50 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
[ 1394.248908] FAULT_INJECTION: forcing a failure.
[ 1394.248908] name failslab, interval 1, probability 0, space 0, times 0
[ 1394.250035] CPU: 0 UID: 0 PID: 18470 Comm: syz-executor.6 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1394.250053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1394.250063] Call Trace:
[ 1394.250069]
[ 1394.250074] dump_stack_lvl+0xfa/0x120
05:09:50 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x20010}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1394.250105] should_fail_ex+0x4d7/0x5e0
[ 1394.250130] ? ptlock_alloc+0x21/0x70
[ 1394.250160] should_failslab+0xc2/0x120
[ 1394.250177] kmem_cache_alloc_noprof+0x80/0x690
[ 1394.250199] ? __pfx_perf_trace_lock+0x10/0x10
[ 1394.250234] ? ptlock_alloc+0x21/0x70
[ 1394.250250] ptlock_alloc+0x21/0x70
[ 1394.250270] pte_alloc_one+0x86/0x3f0
[ 1394.250289] __pte_alloc+0x6c/0x3f0
[ 1394.250304] ? __pfx___pte_alloc+0x10/0x10
[ 1394.250319] ? _raw_spin_unlock+0x1e/0x40
[ 1394.250341] ? __pmd_alloc+0x42f/0xad0
[ 1394.250364] copy_page_range+0x169a/0x4360
[ 1394.250415] ? lock_is_held_type+0x9e/0x120
[ 1394.250447] ? __pfx___sanitizer_cov_trace_const_cmp4+0x6/0x10
[ 1394.250469] ? __pfx_copy_page_range+0x10/0x10
[ 1394.250497] ? mas_store+0x17f/0x770
[ 1394.250523] ? lock_release+0xc8/0x290
[ 1394.250566] ? lock_is_held_type+0x9e/0x120
[ 1394.250589] dup_mmap+0xd27/0x1d00
[ 1394.250628] ? __pfx_dup_mmap+0x10/0x10
[ 1394.250641] ? _raw_spin_unlock_irqrestore+0x2c/0x50
[ 1394.250688] ? lock_is_held_type+0x9e/0x120
[ 1394.250715] copy_process+0x632b/0x72a0
[ 1394.250736] ? __pfx_perf_trace_lock+0x10/0x10
[ 1394.250781] ? __pfx_copy_process+0x10/0x10
[ 1394.250801] ? __might_fault+0xe0/0x190
[ 1394.250833] ? _copy_from_user+0x5b/0xd0
[ 1394.250861] kernel_clone+0xea/0x7f0
[ 1394.250877] ? get_pid_task+0xfd/0x250
[ 1394.250899] ? __pfx_kernel_clone+0x10/0x10
[ 1394.250952] __do_sys_clone3+0x1f5/0x280
[ 1394.250971] ? __pfx___do_sys_clone3+0x10/0x10
[ 1394.250990] ? perf_trace_lock+0xbc/0x5f0
[ 1394.251033] ? lock_acquire+0x15e/0x2f0
[ 1394.251056] ? __pfx_perf_trace_lock+0x10/0x10
[ 1394.251078] ? __might_fault+0x138/0x190
[ 1394.251098] ? lock_release+0xc8/0x290
[ 1394.251120] ? __might_fault+0xe0/0x190
[ 1394.251142] ? find_held_lock+0x2b/0x80
[ 1394.251159] ? syscall_trace_enter+0x1cf/0x240
[ 1394.251181] ? lock_release+0xc8/0x290
[ 1394.251217] do_syscall_64+0xbf/0x430
[ 1394.251239] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1394.251253] RIP: 0033:0x7f9541d78b19
[ 1394.251264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1394.251278] RSP: 002b:00007f953f2ee188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3
[ 1394.251290] RAX: ffffffffffffffda RBX: 00007f9541e8bf60 RCX: 00007f9541d78b19
[ 1394.251299] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000040
[ 1394.251306] RBP: 00007f953f2ee1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1394.251314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1394.251322] R13: 00007ffdfbaf907f R14: 00007f953f2ee300 R15: 0000000000022000
[ 1394.251360]
[ 1394.289400] loop2: detected capacity change from 0 to 512
[ 1394.298750] loop3: detected capacity change from 0 to 512
[ 1394.300846] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1394.301510] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1394.327785] loop5: detected capacity change from 0 to 512
[ 1394.333047] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1394.334025] EXT4-fs (loop3): group descriptors corrupted!
05:09:50 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xfdfdffff, 0x0})
[ 1394.364615] EXT4-fs error (device loop5): __ext4_fill_super:5513: inode #2: comm syz-executor.5: iget: special inode unallocated
05:09:50 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x20200}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1394.385681] EXT4-fs (loop5): get root inode failed
[ 1394.386553] EXT4-fs (loop5): mount failed
[ 1394.407913] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1394.500871] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:09:50 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:50 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 100)
05:09:50 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:09:50 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
05:09:50 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1394.535664] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1394.536968] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1394.562057] loop5: detected capacity change from 0 to 512
[ 1394.592018] EXT4-fs error (device loop5): __ext4_fill_super:5513: inode #2: comm syz-executor.5: iget: special inode unallocated
[ 1394.598348] EXT4-fs (loop5): get root inode failed
[ 1394.598785] EXT4-fs (loop5): mount failed
[ 1394.618304] loop3: detected capacity change from 0 to 512
[ 1394.646809] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1394.647661] EXT4-fs (loop3): group descriptors corrupted!
05:09:50 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xffefffff, 0x0})
05:09:50 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x40000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1394.751568] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1394.752301] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:10:01 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:01 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xffffefff, 0x0})
05:10:01 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
05:10:01 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:01 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:01 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:01 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e01000000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:01 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1405.148369] loop5: detected capacity change from 0 to 512
[ 1405.169885] loop2: detected capacity change from 0 to 512
[ 1405.191460] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1405.192810] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1405.214686] loop3: detected capacity change from 0 to 512
[ 1405.215722] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1405.217085] EXT4-fs (loop5): group descriptors corrupted!
05:10:01 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x400000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:01 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xfffffdfd, 0x0})
[ 1405.291305] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1405.294226] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1405.296066] EXT4-fs (loop3): group descriptors corrupted!
05:10:01 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
05:10:01 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1405.500863] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1405.502295] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:10:01 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e01000000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:01 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1405.513068] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1405.559838] loop5: detected capacity change from 0 to 512
05:10:01 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:01 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xf0ff1f}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1405.617890] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1405.619758] EXT4-fs (loop5): group descriptors corrupted!
[ 1405.693284] loop3: detected capacity change from 0 to 512
[ 1405.694675] loop2: detected capacity change from 0 to 512
[ 1405.708586] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1405.710099] EXT4-fs (loop3): group descriptors corrupted!
[ 1405.799985] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1405.877982] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:10:12 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
05:10:12 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xfffffff5, 0x0})
05:10:12 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xf0ffff}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:12 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:12 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:12 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:12 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1416.810991] loop5: detected capacity change from 0 to 512
[ 1416.811801] loop3: detected capacity change from 0 to 512
[ 1416.833720] loop2: detected capacity change from 0 to 512
[ 1416.862939] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1416.864265] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1416.865721] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1416.866704] EXT4-fs (loop3): group descriptors corrupted!
[ 1416.867670] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1416.868759] EXT4-fs (loop5): group descriptors corrupted!
[ 1416.959815] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:10:13 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x1000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:13 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xfffffff6, 0x0})
05:10:13 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:13 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1417.042675] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1417.044010] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1417.090889] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:10:13 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1417.141664] loop3: detected capacity change from 0 to 512
[ 1417.209249] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1417.210685] EXT4-fs (loop3): group descriptors corrupted!
[ 1417.271423] loop2: detected capacity change from 0 to 512
[ 1417.354879] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1417.413812] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:10:25 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:25 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
05:10:25 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0xffffffff, 0x0})
05:10:25 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:25 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:25 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:25 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x5}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:25 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x2000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1429.419802] loop5: detected capacity change from 0 to 512
[ 1429.422234] loop3: detected capacity change from 0 to 512
[ 1429.423826] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1429.424582] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1429.447438] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1429.448393] EXT4-fs (loop5): group descriptors corrupted!
[ 1429.457566] loop2: detected capacity change from 0 to 512
[ 1429.458535] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1429.459419] EXT4-fs (loop3): group descriptors corrupted!
[ 1429.487833] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:10:25 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
05:10:25 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x3000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1429.539661] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:10:25 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:25 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:25 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1429.584871] loop2: detected capacity change from 0 to 512
05:10:25 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x5, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1429.603042] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1429.605730] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1429.606483] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:10:25 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x4000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1429.624398] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1429.642059] loop5: detected capacity change from 0 to 512
[ 1429.662299] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1429.663078] EXT4-fs (loop5): group descriptors corrupted!
[ 1429.664042] loop3: detected capacity change from 0 to 512
[ 1429.680198] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1429.680920] EXT4-fs (loop3): group descriptors corrupted!
05:10:34 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x5425, 0x7)
05:10:34 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x6, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1438.491463] loop5: detected capacity change from 0 to 512
05:10:34 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:34 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2})
05:10:34 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x8000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:34 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:34 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x6}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1438.505160] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1438.506023] EXT4-fs (loop5): group descriptors corrupted!
05:10:34 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1438.538599] loop3: detected capacity change from 0 to 512
[ 1438.543525] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1438.544836] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1438.562644] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1438.563785] EXT4-fs (loop3): group descriptors corrupted!
05:10:34 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x9000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:34 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1438.620641] loop2: detected capacity change from 0 to 512
05:10:34 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x6})
05:10:34 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1438.649922] loop5: detected capacity change from 0 to 512
[ 1438.675224] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1438.676056] EXT4-fs (loop5): group descriptors corrupted!
05:10:34 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x10000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:34 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x7, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1438.710347] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1438.732885] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1438.733660] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1438.735868] loop3: detected capacity change from 0 to 512
[ 1438.791483] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1438.793282] EXT4-fs (loop3): group descriptors corrupted!
05:10:34 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1438.854279] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1438.889152] loop5: detected capacity change from 0 to 512
[ 1438.936031] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1438.937474] EXT4-fs (loop5): group descriptors corrupted!
05:10:46 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
05:10:46 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x10000200}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:46 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x5425, 0x7)
05:10:46 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:46 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:46 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:46 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:46 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1450.021433] loop2: detected capacity change from 0 to 512
[ 1450.027173] loop3: detected capacity change from 0 to 512
[ 1450.036839] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1450.037749] EXT4-fs (loop3): group descriptors corrupted!
[ 1450.042763] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
05:10:46 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x11000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1450.068988] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1450.070512] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1450.098829] loop5: detected capacity change from 0 to 512
05:10:46 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:46 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1450.152406] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1450.153176] EXT4-fs (loop5): group descriptors corrupted!
[ 1450.155586] loop3: detected capacity change from 0 to 512
[ 1450.158916] loop2: detected capacity change from 0 to 512
[ 1450.179249] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1450.179965] EXT4-fs (loop3): group descriptors corrupted!
[ 1450.188309] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
05:10:46 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})
05:10:46 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:46 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:46 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x1fffefff}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:46 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1450.272441] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1450.273137] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1450.332584] loop3: detected capacity change from 0 to 512
05:10:46 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0xd})
[ 1450.359075] loop2: detected capacity change from 0 to 512
[ 1450.360661] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1450.361637] EXT4-fs (loop3): group descriptors corrupted!
[ 1450.378883] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1450.397682] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1450.398381] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:10:46 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x9, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1450.444974] loop5: detected capacity change from 0 to 512
[ 1450.465051] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1450.466461] EXT4-fs (loop5): group descriptors corrupted!
05:10:57 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xb, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:57 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x1ffff000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:57 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:57 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:57 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
05:10:57 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:57 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x5425, 0x7)
05:10:57 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1461.394580] loop2: detected capacity change from 0 to 512
[ 1461.396848] loop3: detected capacity change from 0 to 512
[ 1461.437654] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1461.439027] EXT4-fs (loop3): group descriptors corrupted!
[ 1461.440511] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1461.443596] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1461.444939] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1461.453934] loop5: detected capacity change from 0 to 512
[ 1461.477207] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1461.478771] EXT4-fs (loop5): group descriptors corrupted!
05:10:57 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x20000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:57 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2})
05:10:57 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:57 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:57 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1461.712240] loop3: detected capacity change from 0 to 512
[ 1461.715327] loop2: detected capacity change from 0 to 512
[ 1461.743444] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1461.744676] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1461.750894] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1461.758322] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1461.759664] EXT4-fs (loop3): group descriptors corrupted!
05:10:57 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x3f000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1461.822357] loop5: detected capacity change from 0 to 512
[ 1461.843281] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1461.844762] EXT4-fs (loop5): group descriptors corrupted!
05:10:57 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x11, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:10:57 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6})
05:10:57 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:10:58 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1462.027928] loop3: detected capacity change from 0 to 512
[ 1462.034020] loop2: detected capacity change from 0 to 512
[ 1462.039046] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1462.064227] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1462.065724] EXT4-fs (loop3): group descriptors corrupted!
[ 1462.069798] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1462.071072] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:11:09 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:09 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:09 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x5425, 0x7)
05:11:09 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:09 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:09 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
05:11:09 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:09 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x40000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1473.039821] loop3: detected capacity change from 0 to 512
05:11:09 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x443e0000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1473.085814] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1473.086703] EXT4-fs (loop3): group descriptors corrupted!
[ 1473.106777] loop5: detected capacity change from 0 to 512
[ 1473.112357] loop2: detected capacity change from 0 to 512
[ 1473.118921] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1473.120228] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1473.133546] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1473.134967] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1473.136341] EXT4-fs (loop5): group descriptors corrupted!
05:11:09 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:09 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0x8a020000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:09 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xf4, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:09 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})
[ 1473.221754] loop3: detected capacity change from 0 to 512
05:11:09 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1473.244856] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1473.245699] EXT4-fs (loop3): group descriptors corrupted!
05:11:09 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1473.345547] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1473.346274] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1473.362880] loop2: detected capacity change from 0 to 512
[ 1473.378466] loop5: detected capacity change from 0 to 512
[ 1473.390552] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1473.402666] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1473.404074] EXT4-fs (loop5): group descriptors corrupted!
05:11:18 executing program 7:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x5425, 0x7)
05:11:18 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xe4ffffff}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:18 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0xb}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:18 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:18 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x1b8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:18 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:18 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:18 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd})
05:11:18 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xfeffffff}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1482.402646] loop3: detected capacity change from 0 to 512
[ 1482.426671] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1482.427449] EXT4-fs (loop3): group descriptors corrupted!
[ 1482.432486] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1482.433190] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1482.433224] loop2: detected capacity change from 0 to 512
[ 1482.435979] loop5: detected capacity change from 0 to 512
[ 1482.454691] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1482.457091] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1482.458491] EXT4-fs (loop5): group descriptors corrupted!
05:11:18 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:18 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
05:11:18 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xff600000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:18 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:18 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x21e, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:18 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1482.572705] loop3: detected capacity change from 0 to 512
[ 1482.593556] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1482.594324] EXT4-fs (loop3): group descriptors corrupted!
[ 1482.598437] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1482.599081] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1482.707800] loop2: detected capacity change from 0 to 512
[ 1482.716788] loop5: detected capacity change from 0 to 512
[ 1482.731412] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1482.733233] EXT4-fs (loop5): group descriptors corrupted!
[ 1482.764659] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1482.849676] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:11:29 executing program 7:
openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:11:29 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xffefff1f}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:29 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:29 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2})
05:11:29 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:29 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:29 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:29 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x26c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1493.663228] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1493.664501] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1493.675973] loop3: detected capacity change from 0 to 512
[ 1493.689975] loop5: detected capacity change from 0 to 512
[ 1493.709389] loop2: detected capacity change from 0 to 512
[ 1493.709588] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1493.712331] EXT4-fs (loop5): group descriptors corrupted!
[ 1493.727809] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1493.729487] EXT4-fs (loop3): group descriptors corrupted!
05:11:29 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xfffff000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:29 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6})
[ 1493.794170] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
05:11:29 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1493.879340] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1493.880605] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:11:30 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:30 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xffffffe4}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:30 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:30 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
[ 1494.002906] loop5: detected capacity change from 0 to 512
05:11:30 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1494.038079] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1494.039434] EXT4-fs (loop5): group descriptors corrupted!
[ 1494.080735] loop3: detected capacity change from 0 to 512
[ 1494.091342] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1494.092556] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1494.098541] loop2: detected capacity change from 0 to 512
[ 1494.103209] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1494.104465] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1494.119487] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1494.132487] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1494.133882] EXT4-fs (loop3): group descriptors corrupted!
05:11:40 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xfffffffe}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:40 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})
05:11:40 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:40 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:11:40 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:40 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:40 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:40 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x28}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1504.188521] loop3: detected capacity change from 0 to 512
[ 1504.222403] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1504.223370] EXT4-fs (loop3): group descriptors corrupted!
05:11:40 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {0xffffffff}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1504.236928] loop2: detected capacity change from 0 to 512
[ 1504.240609] loop5: detected capacity change from 0 to 512
[ 1504.245571] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1504.246779] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1504.256147] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1504.257335] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1504.259891] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1504.268520] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1504.269425] EXT4-fs (loop5): group descriptors corrupted!
05:11:40 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1504.348302] loop3: detected capacity change from 0 to 512
05:11:40 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:40 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd})
05:11:40 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655f", 0x30, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:40 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x2, 0x0, 0x0}, 0x58)
[ 1504.413067] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1504.449963] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1504.451240] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1504.454330] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1504.455547] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:11:40 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x600, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1504.474675] loop5: detected capacity change from 0 to 512
[ 1504.480558] loop2: detected capacity change from 0 to 512
[ 1504.481427] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1504.482764] EXT4-fs (loop5): group descriptors corrupted!
[ 1504.520484] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1504.532021] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:11:40 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:40 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
05:11:40 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0xf4}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:40 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1504.587988] loop5: detected capacity change from 0 to 512
[ 1504.609751] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1504.610490] EXT4-fs (loop5): group descriptors corrupted!
[ 1504.666878] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1504.667594] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:11:52 executing program 7:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:11:52 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655f", 0x30, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:52 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:52 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:11:52 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2})
05:11:52 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x23a}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:52 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x700, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:11:52 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x3, 0x0, 0x0}, 0x58)
[ 1516.149156] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1516.150502] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1516.154670] loop2: detected capacity change from 0 to 512
[ 1516.171219] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1516.204610] loop3: detected capacity change from 0 to 512
[ 1516.247413] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1516.249243] EXT4-fs (loop3): group descriptors corrupted!
[ 1516.249451] loop5: detected capacity change from 0 to 512
05:11:52 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6})
05:11:52 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x4, 0x0, 0x0}, 0x58)
[ 1516.302941] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
05:11:52 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655f", 0x30, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1516.304336] EXT4-fs (loop5): group descriptors corrupted!
05:11:52 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1516.403220] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1516.404472] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1516.413908] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1516.415090] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1516.454825] loop2: detected capacity change from 0 to 512
05:11:52 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1516.493674] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1516.537151] loop3: detected capacity change from 0 to 512
[ 1516.558523] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1516.560499] EXT4-fs (loop3): group descriptors corrupted!
[ 1516.620006] loop5: detected capacity change from 0 to 512
[ 1516.645605] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1516.646932] EXT4-fs (loop5): group descriptors corrupted!
05:12:02 executing program 7:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:12:02 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x8, 0x0, 0x0}, 0x58)
05:12:02 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:02 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x284}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:02 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:02 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
05:12:02 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000", 0x48, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:02 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1526.645703] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1526.646427] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1526.683174] loop3: detected capacity change from 0 to 512
05:12:02 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})
05:12:02 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x9, 0x0, 0x0}, 0x58)
[ 1526.700710] loop5: detected capacity change from 0 to 512
[ 1526.703340] loop2: detected capacity change from 0 to 512
[ 1526.707783] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1526.709173] EXT4-fs (loop3): group descriptors corrupted!
[ 1526.730474] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1526.732438] EXT4-fs (loop5): group descriptors corrupted!
[ 1526.743639] EXT4-fs error (device loop2): __ext4_fill_super:5513: inode #2: comm syz-executor.2: iget: special inode unallocated
[ 1526.755644] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1526.756419] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1526.763403] EXT4-fs (loop2): get root inode failed
[ 1526.763914] EXT4-fs (loop2): mount failed
05:12:02 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:02 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x10, 0x0, 0x0}, 0x58)
05:12:02 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:02 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd})
05:12:02 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x2a2}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:03 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xb00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1526.964924] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1526.965746] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1526.989802] loop3: detected capacity change from 0 to 512
[ 1527.017167] loop5: detected capacity change from 0 to 512
[ 1527.034769] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1527.035928] EXT4-fs (loop3): group descriptors corrupted!
[ 1527.044060] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1527.045619] EXT4-fs (loop5): group descriptors corrupted!
05:12:12 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000", 0x48, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:12 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:12 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
05:12:12 executing program 7:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:12:12 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x300}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x11, 0x0, 0x0}, 0x58)
05:12:12 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:12 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xf0, 0x0, 0x0}, 0x58)
[ 1536.688518] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1536.689247] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1536.713953] loop2: detected capacity change from 0 to 512
[ 1536.719578] loop3: detected capacity change from 0 to 512
[ 1536.724390] loop5: detected capacity change from 0 to 512
[ 1536.764879] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1536.765862] EXT4-fs (loop3): group descriptors corrupted!
05:12:12 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x1e02, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x28a, 0x0, 0x0}, 0x58)
[ 1536.781452] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1536.782471] EXT4-fs (loop5): group descriptors corrupted!
[ 1536.793363] EXT4-fs error (device loop2): __ext4_fill_super:5513: inode #2: comm syz-executor.2: iget: special inode unallocated
[ 1536.799037] EXT4-fs (loop2): get root inode failed
[ 1536.800681] EXT4-fs (loop2): mount failed
05:12:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x300, 0x0, 0x0}, 0x58)
05:12:12 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2})
[ 1536.860800] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1536.861459] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:12:24 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:24 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6})
05:12:24 executing program 7:
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:12:24 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:24 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x900, 0x0, 0x0}, 0x58)
05:12:24 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x500}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:24 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000", 0x48, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:24 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1548.231603] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1548.232391] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1548.239853] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1548.240608] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1548.252381] loop5: detected capacity change from 0 to 512
05:12:24 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
[ 1548.292547] loop2: detected capacity change from 0 to 512
[ 1548.295703] loop3: detected capacity change from 0 to 512
[ 1548.296040] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:12:24 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x600}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1548.355069] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1548.356390] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1548.358537] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1548.360236] EXT4-fs (loop3): group descriptors corrupted!
05:12:24 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x1100, 0x0, 0x0}, 0x58)
[ 1548.405555] EXT4-fs error (device loop2): __ext4_fill_super:5513: inode #2: comm syz-executor.2: iget: special inode unallocated
[ 1548.418807] EXT4-fs (loop2): get root inode failed
05:12:24 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1548.420306] EXT4-fs (loop2): mount failed
[ 1548.473658] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:12:24 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:24 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})
[ 1548.550511] loop3: detected capacity change from 0 to 512
[ 1548.561046] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1548.561874] EXT4-fs (loop3): group descriptors corrupted!
05:12:24 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x2000, 0x0, 0x0}, 0x58)
05:12:24 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x700}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1548.617561] loop5: detected capacity change from 0 to 512
05:12:24 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1548.652729] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1548.653971] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:12:24 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1548.671489] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1548.686693] loop2: detected capacity change from 0 to 512
[ 1548.698223] EXT4-fs (loop2): invalid first ino: 0
[ 1548.773823] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1548.784711] loop3: detected capacity change from 0 to 512
[ 1548.829192] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1548.830497] EXT4-fs (loop3): group descriptors corrupted!
05:12:35 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x2800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:35 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd})
05:12:35 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:35 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x900}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:35 executing program 7:
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:12:35 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:35 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x3e44, 0x0, 0x0}, 0x58)
05:12:35 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1559.008798] loop3: detected capacity change from 0 to 512
[ 1559.014649] loop2: detected capacity change from 0 to 512
[ 1559.019805] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1559.020963] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1559.024823] loop5: detected capacity change from 0 to 512
[ 1559.038778] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1559.040250] EXT4-fs (loop3): group descriptors corrupted!
[ 1559.051066] EXT4-fs (loop2): invalid first ino: 0
05:12:35 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00, 0x0, 0x0}, 0x58)
05:12:35 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600})
[ 1559.157649] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:12:35 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:35 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1559.263229] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1559.264774] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1559.274948] loop2: detected capacity change from 0 to 512
[ 1559.295964] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:12:35 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0xb00}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:35 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1559.325646] EXT4-fs (loop2): invalid first ino: 0
[ 1559.355045] loop3: detected capacity change from 0 to 512
05:12:35 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900})
05:12:35 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x4000, 0x0, 0x0}, 0x58)
[ 1559.403850] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1559.405542] EXT4-fs (loop3): group descriptors corrupted!
[ 1559.422464] loop5: detected capacity change from 0 to 512
05:12:35 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:35 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x3f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1559.492935] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1559.524691] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1559.566153] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1559.567246] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1559.581680] loop2: detected capacity change from 0 to 512
[ 1559.669003] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1559.731479] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:12:46 executing program 7:
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:12:46 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:46 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00})
05:12:46 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:46 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x443e, 0x0, 0x0}, 0x58)
05:12:46 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:46 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:46 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1570.321089] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1570.322448] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1570.323032] loop3: detected capacity change from 0 to 512
[ 1570.340876] loop5: detected capacity change from 0 to 512
[ 1570.364160] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1570.365325] EXT4-fs (loop3): group descriptors corrupted!
[ 1570.365459] loop2: detected capacity change from 0 to 512
05:12:46 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000})
[ 1570.431521] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1570.447871] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:12:46 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:46 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x60ff, 0x0, 0x0}, 0x58)
[ 1570.534046] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1570.535288] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:12:46 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfd})
[ 1570.599007] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:12:46 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:46 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1570.669767] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1570.675495] loop3: detected capacity change from 0 to 512
05:12:46 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x1a88}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1570.718262] loop2: detected capacity change from 0 to 512
05:12:46 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x8a02, 0x0, 0x0}, 0x58)
[ 1570.727583] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1570.728428] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1570.734450] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1570.735349] EXT4-fs (loop3): group descriptors corrupted!
[ 1570.738470] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1570.739306] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1570.807939] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1570.840201] loop5: detected capacity change from 0 to 512
[ 1570.882427] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1570.884827] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1570.954014] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:12:58 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff})
05:12:58 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:58 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x6c02, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:58 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:58 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:12:58 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:58 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xf000, 0x0, 0x0}, 0x58)
05:12:58 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:12:58 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x20010, 0x0, 0x0}, 0x58)
[ 1582.174656] loop5: detected capacity change from 0 to 512
05:12:58 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x20200, 0x0, 0x0}, 0x58)
[ 1582.238701] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1582.240414] loop3: detected capacity change from 0 to 512
[ 1582.242571] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1582.243304] EXT4-fs (loop3): group descriptors corrupted!
[ 1582.252449] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1582.253134] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:12:58 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1582.278560] loop2: detected capacity change from 0 to 512
[ 1582.295518] loop3: detected capacity change from 0 to 512
[ 1582.298757] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1582.299516] EXT4-fs (loop3): group descriptors corrupted!
05:12:58 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1582.334047] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:12:58 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x40000, 0x0, 0x0}, 0x58)
05:12:58 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:12:58 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
[ 1582.400744] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:12:58 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x80000, 0x0, 0x0}, 0x58)
[ 1582.409655] loop3: detected capacity change from 0 to 512
[ 1582.417957] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1582.418664] EXT4-fs (loop3): group descriptors corrupted!
[ 1582.460705] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1582.549513] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1582.550213] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1582.557557] loop2: detected capacity change from 0 to 512
[ 1582.590485] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1582.636047] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:13:09 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:13:09 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:09 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:09 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x2800}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:09 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:09 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xb801, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:09 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x400000, 0x0, 0x0}, 0x58)
05:13:09 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2})
[ 1593.412969] loop2: detected capacity change from 0 to 512
[ 1593.415215] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1593.416469] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:13:09 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ff1f, 0x0, 0x0}, 0x58)
[ 1593.459739] loop5: detected capacity change from 0 to 512
[ 1593.472678] loop3: detected capacity change from 0 to 512
[ 1593.477795] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:13:09 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6})
[ 1593.542548] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1593.543310] EXT4-fs (loop3): group descriptors corrupted!
[ 1593.543746] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1593.568538] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:13:09 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:09 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ffff, 0x0, 0x0}, 0x58)
[ 1593.625523] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1593.626934] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1593.655000] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:13:09 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:09 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:09 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x3a02}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1593.714477] loop2: detected capacity change from 0 to 512
[ 1593.761541] loop3: detected capacity change from 0 to 512
[ 1593.763386] loop5: detected capacity change from 0 to 512
[ 1593.771463] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1593.804021] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1593.804798] EXT4-fs (loop3): group descriptors corrupted!
[ 1593.813334] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1593.824649] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1593.866678] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:13:20 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:13:20 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x3f00}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:20 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x1000000, 0x0, 0x0}, 0x58)
05:13:20 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:20 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xf400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:20 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
05:13:20 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:20 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1604.264376] loop3: detected capacity change from 0 to 512
[ 1604.266074] loop2: detected capacity change from 0 to 512
[ 1604.277663] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1604.278727] EXT4-fs (loop3): group descriptors corrupted!
[ 1604.300927] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1604.313500] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1604.314913] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1604.323009] loop5: detected capacity change from 0 to 512
[ 1604.329204] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1604.330572] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:13:20 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:20 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1604.436768] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:13:20 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x20010, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:20 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x2000000, 0x0, 0x0}, 0x58)
05:13:20 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})
[ 1604.507210] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:13:20 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1604.542425] loop2: detected capacity change from 0 to 512
[ 1604.547974] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1604.587708] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1604.593861] loop3: detected capacity change from 0 to 512
[ 1604.626692] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1604.628274] EXT4-fs (loop3): group descriptors corrupted!
[ 1604.642847] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1604.643768] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1604.686285] loop5: detected capacity change from 0 to 512
05:13:20 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:20 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000020000", 0x5c, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1604.710877] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1604.729690] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1604.808717] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1604.838702] loop2: detected capacity change from 0 to 512
[ 1604.866039] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1604.926389] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:13:31 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:13:31 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd})
05:13:31 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000020000", 0x5c, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:31 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:31 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:31 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x8402}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:31 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x3000000, 0x0, 0x0}, 0x58)
05:13:31 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1615.797586] loop3: detected capacity change from 0 to 512
[ 1615.810188] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1615.810869] EXT4-fs (loop3): group descriptors corrupted!
[ 1615.857937] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1615.858601] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1615.863467] loop5: detected capacity change from 0 to 512
[ 1615.866149] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1615.866803] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1615.890729] loop2: detected capacity change from 0 to 512
05:13:32 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000, 0x0, 0x0}, 0x58)
05:13:32 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:32 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600})
[ 1615.941253] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1615.952001] EXT4-fs error (device loop5): ext4_validate_block_bitmap:431: comm ext4lazyinit: bg 0: block 2: invalid block bitmap
[ 1615.955368] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:13:32 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:32 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x881a}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1616.017630] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1616.018345] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:13:32 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000020000", 0x5c, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1616.027966] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1616.032900] loop3: detected capacity change from 0 to 512
[ 1616.040636] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1616.067030] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1616.068702] EXT4-fs (loop3): group descriptors corrupted!
05:13:32 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900})
05:13:32 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000, 0x0, 0x0}, 0x58)
[ 1616.136083] loop2: detected capacity change from 0 to 512
[ 1616.144574] loop5: detected capacity change from 0 to 512
[ 1616.155128] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1616.155800] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1616.188933] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1616.192686] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1616.230565] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1616.244464] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:13:43 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0xa202}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:43 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00})
05:13:43 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x80000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:43 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x9000000, 0x0, 0x0}, 0x58)
05:13:43 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028", 0x5d}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:43 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:13:43 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:43 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1627.187536] loop5: detected capacity change from 0 to 512
[ 1627.201362] loop2: detected capacity change from 0 to 512
05:13:43 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x10000000, 0x0, 0x0}, 0x58)
[ 1627.212829] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1627.213554] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1627.220470] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1627.233252] loop3: detected capacity change from 0 to 512
05:13:43 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028", 0x5d}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1627.273584] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:13:43 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000})
[ 1627.308735] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1627.309758] EXT4-fs (loop3): group descriptors corrupted!
05:13:43 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0xf400}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:43 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x10000200, 0x0, 0x0}, 0x58)
05:13:43 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1627.348756] loop2: detected capacity change from 0 to 512
[ 1627.348861] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1627.376029] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1627.391864] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1627.392626] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1627.404159] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1627.404841] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:13:43 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:43 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1627.439510] loop5: detected capacity change from 0 to 512
05:13:43 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028", 0x5d}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1627.479009] loop3: detected capacity change from 0 to 512
[ 1627.509683] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1627.513198] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1627.513962] EXT4-fs (loop3): group descriptors corrupted!
[ 1627.551513] loop2: detected capacity change from 0 to 512
[ 1627.554887] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 1627.572452] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:13:55 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x20010}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:55 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x11000000, 0x0, 0x0}, 0x58)
05:13:55 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
[ 1639.178314] loop3: detected capacity change from 0 to 512
05:13:55 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x104000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:55 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:55 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {0x0, 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:55 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, 0x0)
05:13:55 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfd})
05:13:55 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x1fffefff, 0x0, 0x0}, 0x58)
[ 1639.220065] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1639.252276] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1639.253593] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:13:55 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1639.296436] loop2: detected capacity change from 0 to 512
[ 1639.300393] loop5: detected capacity change from 0 to 512
[ 1639.328685] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1639.378471] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:13:55 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff})
[ 1639.433848] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:13:55 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {0x0, 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:13:55 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x1ffff000, 0x0, 0x0}, 0x58)
05:13:55 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x20200}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:13:55 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, 0x0)
[ 1639.504420] loop3: detected capacity change from 0 to 512
[ 1639.530407] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1639.537360] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1639.538696] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:13:55 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000, 0x0, 0x0}, 0x58)
[ 1639.555475] loop5: detected capacity change from 0 to 512
05:13:55 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
[ 1639.634586] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:13:55 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1639.701386] loop2: detected capacity change from 0 to 512
[ 1639.709531] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1639.742422] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1639.787259] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1639.788569] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1639.892711] loop3: detected capacity change from 0 to 512
[ 1639.949653] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1639.993479] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:14:04 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:14:04 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {0x0, 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:04 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:04 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:04 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {0x0}], 0x0, 0x0)
05:14:04 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x3f000000, 0x0, 0x0}, 0x58)
05:14:04 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2})
05:14:04 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x401000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1648.857653] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1648.858355] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1648.865735] loop3: detected capacity change from 0 to 512
[ 1648.879870] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1648.880636] EXT4-fs (loop3): group descriptors corrupted!
05:14:04 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6})
[ 1648.944718] loop2: detected capacity change from 0 to 512
05:14:05 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1648.958085] loop5: detected capacity change from 0 to 512
[ 1648.969364] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1648.970607] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:14:05 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
[ 1649.029872] loop3: detected capacity change from 0 to 512
05:14:05 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x40000000, 0x0, 0x0}, 0x58)
[ 1649.046664] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1649.047625] EXT4-fs (loop3): group descriptors corrupted!
[ 1649.122538] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1649.178521] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:14:14 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:14 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:14 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x101000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:14 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:14 executing program 2:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
05:14:14 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
05:14:14 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:14:14 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x443e0000, 0x0, 0x0}, 0x58)
[ 1658.859029] loop5: detected capacity change from 0 to 512
[ 1658.861839] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1658.863015] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1658.865744] loop3: detected capacity change from 0 to 512
[ 1658.872791] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1658.874148] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1658.910459] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1658.911964] EXT4-fs (loop3): group descriptors corrupted!
05:14:15 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
05:14:15 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})
05:14:15 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
[ 1659.009556] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:14:15 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x8a020000, 0x0, 0x0}, 0x58)
05:14:15 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
05:14:15 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:15 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:15 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xe4ffffff, 0x0, 0x0}, 0x58)
05:14:15 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
[ 1659.187393] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1659.193072] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1659.194150] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1659.292581] loop3: detected capacity change from 0 to 512
[ 1659.316406] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1659.317844] EXT4-fs (loop3): group descriptors corrupted!
[ 1659.372441] loop5: detected capacity change from 0 to 512
[ 1659.393579] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1659.435597] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:14:27 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd})
05:14:27 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:27 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x2000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:27 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xfeffffff, 0x0, 0x0}, 0x58)
05:14:27 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x104000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:27 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x0)
05:14:27 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
05:14:27 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1671.285895] loop3: detected capacity change from 0 to 512
[ 1671.288514] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1671.289749] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1671.321065] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1671.322801] EXT4-fs (loop3): group descriptors corrupted!
[ 1671.360290] loop5: detected capacity change from 0 to 512
05:14:27 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600})
05:14:27 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xff600000, 0x0, 0x0}, 0x58)
05:14:27 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1671.497497] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1671.536596] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1671.538034] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:14:27 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x401000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1671.555888] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1671.557153] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1671.576215] loop3: detected capacity change from 0 to 512
[ 1671.634745] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1671.636046] EXT4-fs (loop3): group descriptors corrupted!
05:14:27 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xffefff1f, 0x0, 0x0}, 0x58)
05:14:27 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900})
05:14:27 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1671.685254] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:14:27 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1671.757564] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1671.758636] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:14:27 executing program 7:
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in=@private, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq={'fowner', 0x3d, r1}}]}})
lseek(r0, 0x0, 0x3)
05:14:27 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00})
[ 1671.883965] loop5: detected capacity change from 0 to 512
[ 1671.910783] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1671.911748] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1671.919176] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1671.920142] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1671.933522] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[ 1671.990927] 9pnet_fd: p9_fd_create_tcp (27145): problem connecting socket to 127.0.0.1
05:14:39 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xfffff000, 0x0, 0x0}, 0x58)
05:14:39 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x1000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:39 executing program 7:
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in=@private, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq={'fowner', 0x3d, r1}}]}})
lseek(r0, 0x0, 0x3)
05:14:39 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
05:14:39 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x3000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:39 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000})
05:14:39 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:39 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1683.360966] loop3: detected capacity change from 0 to 512
[ 1683.375319] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1683.376193] EXT4-fs (loop3): group descriptors corrupted!
[ 1683.405065] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1683.406585] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1683.417186] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1683.418617] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1683.437348] loop5: detected capacity change from 0 to 512
05:14:39 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f00", 0x10, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1683.459450] 9pnet_fd: p9_fd_create_tcp (27194): problem connecting socket to 127.0.0.1
[ 1683.461981] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
05:14:39 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffe4, 0x0, 0x0}, 0x58)
[ 1683.541479] loop3: detected capacity change from 0 to 512
05:14:39 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfd})
[ 1683.562469] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24712!=0)
[ 1683.563392] EXT4-fs (loop3): group descriptors corrupted!
05:14:39 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:39 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x2000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:39 executing program 7:
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in=@private, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq={'fowner', 0x3d, r1}}]}})
lseek(r0, 0x0, 0x3)
05:14:39 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1683.656437] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1683.657689] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:14:39 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xfffffffe, 0x0, 0x0}, 0x58)
[ 1683.695396] loop5: detected capacity change from 0 to 512
[ 1683.751956] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[ 1683.790807] 9pnet_fd: p9_fd_create_tcp (27342): problem connecting socket to 127.0.0.1
05:14:52 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000})
05:14:52 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x3000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:52 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:52 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
05:14:52 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x100000800, 0x0, 0x0}, 0x58)
05:14:52 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:52 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x4000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:52 executing program 7:
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in=@private, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq={'fowner', 0x3d, r1}}]}})
[ 1695.990416] loop3: detected capacity change from 0 to 512
[ 1696.009686] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1696.010492] EXT4-fs (loop3): group descriptors corrupted!
[ 1696.028887] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1696.030465] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1696.039455] loop5: detected capacity change from 0 to 512
[ 1696.055859] 9pnet_fd: p9_fd_create_tcp (27509): problem connecting socket to 127.0.0.1
[ 1696.058807] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
05:14:52 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x10000000000, 0x0, 0x0}, 0x58)
05:14:52 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x4000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:14:52 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:14:52 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000})
05:14:52 executing program 7:
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1696.173961] loop3: detected capacity change from 0 to 512
05:14:52 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
05:14:52 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1696.190261] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1696.190994] EXT4-fs (loop3): group descriptors corrupted!
[ 1696.213929] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1696.215084] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1696.310623] 9pnet_fd: p9_fd_create_tcp (27582): problem connecting socket to 127.0.0.1
[ 1696.321905] loop5: detected capacity change from 0 to 512
[ 1696.343400] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
05:15:04 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:04 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:04 executing program 7:
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:15:04 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
05:15:04 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x40000000000, 0x0, 0x0}, 0x58)
05:15:04 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000})
05:15:04 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x5000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:15:04 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x5000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1708.248815] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1708.250032] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:15:04 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000})
[ 1708.344520] loop3: detected capacity change from 0 to 512
[ 1708.344844] loop5: detected capacity change from 0 to 512
[ 1708.358707] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1708.360187] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1708.366717] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1708.368249] EXT4-fs (loop3): group descriptors corrupted!
[ 1708.418658] 9pnet_fd: p9_fd_create_tcp (27752): problem connecting socket to 127.0.0.1
05:15:04 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="b7", 0x1}], 0x1, 0x1000, 0x0)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
[ 1708.477226] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
05:15:04 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000})
05:15:04 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x60ffffffffff, 0x0, 0x0}, 0x58)
05:15:04 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1708.567779] loop3: detected capacity change from 0 to 512
[ 1708.591763] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1708.593449] EXT4-fs (loop3): group descriptors corrupted!
05:15:04 executing program 7:
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1708.645758] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1708.647188] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:15:04 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:04 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1708.816137] loop3: detected capacity change from 0 to 512
[ 1708.817953] loop5: detected capacity change from 0 to 512
[ 1708.821810] 9pnet_fd: p9_fd_create_tcp (27902): problem connecting socket to 127.0.0.1
[ 1708.833325] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[ 1708.853928] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (44154!=0)
[ 1708.855518] EXT4-fs (loop3): group descriptors corrupted!
05:15:17 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x7f50c764cfff, 0x0, 0x0}, 0x58)
05:15:17 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
05:15:17 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:17 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:17 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:15:17 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x6000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:15:17 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000})
05:15:17 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x6000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1721.641490] 9pnet_fd: p9_fd_create_tcp (27980): problem connecting socket to 127.0.0.1
[ 1721.646649] loop3: detected capacity change from 0 to 512
[ 1721.667243] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1721.668550] EXT4-fs (loop3): group descriptors corrupted!
[ 1721.694943] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1721.696223] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1721.714990] loop5: detected capacity change from 0 to 512
[ 1721.757439] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
05:15:17 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:15:17 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000})
05:15:17 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:17 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x7ffffffff000, 0x0, 0x0}, 0x58)
[ 1721.909023] 9pnet_fd: p9_fd_create_tcp (28098): problem connecting socket to 127.0.0.1
[ 1721.932430] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1721.933862] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:15:18 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:18 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x7000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1721.985423] loop3: detected capacity change from 0 to 512
05:15:18 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:15:18 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000})
[ 1722.060820] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1722.062421] EXT4-fs (loop3): group descriptors corrupted!
[ 1722.092909] loop5: detected capacity change from 0 to 512
[ 1722.138042] 9pnet_fd: p9_fd_create_tcp (28161): problem connecting socket to 127.0.0.1
[ 1722.139338] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
[ 1722.171047] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1722.172024] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:15:29 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:15:29 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
truncate(&(0x7f0000000100)='./file0\x00', 0x80)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
05:15:29 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x7000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:15:29 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffdff0})
05:15:29 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:29 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x9000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:15:29 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:29 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x2001000000000, 0x0, 0x0}, 0x58)
[ 1733.544420] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1733.545625] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1733.562067] loop3: detected capacity change from 0 to 512
[ 1733.595758] loop5: detected capacity change from 0 to 512
[ 1733.607650] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=0)
[ 1733.609269] EXT4-fs (loop3): group descriptors corrupted!
[ 1733.646293] 9pnet_fd: p9_fd_create_tcp (28335): problem connecting socket to 127.0.0.1
05:15:29 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0dfff7f})
05:15:29 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x2020000000000, 0x0, 0x0}, 0x58)
05:15:29 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1733.739586] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:15:29 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1733.866779] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1733.868076] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1733.952057] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1733.968081] loop3: detected capacity change from 0 to 512
[ 1734.028417] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1734.030024] EXT4-fs (loop3): group descriptors corrupted!
05:15:42 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x400005})
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r2, 0x5425, 0x7)
05:15:42 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:15:42 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:42 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0xb000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:15:42 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:42 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff})
05:15:42 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000000000, 0x0, 0x0}, 0x58)
05:15:42 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x9000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1746.122893] loop3: detected capacity change from 0 to 512
[ 1746.151989] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1746.153215] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1746.162422] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1746.167884] EXT4-fs (loop3): group descriptors corrupted!
[ 1746.177228] loop5: detected capacity change from 0 to 512
05:15:42 executing program 7:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1746.244075] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:15:42 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff})
05:15:42 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x8000001000000, 0x0, 0x0}, 0x58)
05:15:42 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f", 0x1f, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:42 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x10000200}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1746.374399] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1746.375607] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:15:42 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1746.424460] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1746.432647] loop3: detected capacity change from 0 to 512
05:15:42 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff})
05:15:42 executing program 7:
creat(0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1746.544552] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (23679!=127)
[ 1746.546058] EXT4-fs (loop3): group descriptors corrupted!
[ 1746.569820] loop5: detected capacity change from 0 to 512
[ 1746.586514] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1746.587610] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1746.594187] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1746.595329] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1746.648553] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1746.750379] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:15:53 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x40000000000000, 0x0, 0x0}, 0x58)
05:15:53 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x5425, 0x7)
05:15:53 executing program 7:
creat(0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:15:53 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xb000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:15:53 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:53 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x11000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:15:53 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffefffff})
05:15:53 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1757.079228] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1757.080522] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1757.109789] loop5: detected capacity change from 0 to 512
[ 1757.116571] loop3: detected capacity change from 0 to 512
[ 1757.149360] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1757.150723] EXT4-fs (loop3): group descriptors corrupted!
05:15:53 executing program 7:
creat(0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:15:53 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffefff})
05:15:53 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ff1f00000000, 0x0, 0x0}, 0x58)
[ 1757.206518] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:15:53 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ffffff7f0000, 0x0, 0x0}, 0x58)
05:15:53 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:53 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:15:53 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1757.321617] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1757.369776] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1757.371044] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1757.421785] loop3: detected capacity change from 0 to 512
[ 1757.458962] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1757.460387] EXT4-fs (loop3): group descriptors corrupted!
05:15:53 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x1fffefff}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1757.493009] loop5: detected capacity change from 0 to 512
05:15:53 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd})
[ 1757.496488] 9pnet_fd: p9_fd_create_tcp (29034): problem connecting socket to 127.0.0.1
05:15:53 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ffffffffffff, 0x0, 0x0}, 0x58)
[ 1757.613223] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1757.614442] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1757.629593] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1757.763775] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:16:04 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x100000000000000, 0x0, 0x0}, 0x58)
05:16:04 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x5425, 0x7)
05:16:04 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:04 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:16:04 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x20000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:04 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5})
05:16:04 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:04 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x10000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1768.226794] loop3: detected capacity change from 0 to 512
[ 1768.226863] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1768.228588] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1768.245661] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[ 1768.246570] EXT4-fs (loop3): group descriptors corrupted!
[ 1768.265760] 9pnet_fd: p9_fd_create_tcp (29338): problem connecting socket to 127.0.0.1
[ 1768.268513] loop5: detected capacity change from 0 to 512
05:16:04 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x11000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:04 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:04 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x200000000000000, 0x0, 0x0}, 0x58)
05:16:04 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6})
05:16:04 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x28000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:04 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1768.372287] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1768.372979] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1768.378708] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1768.379418] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1768.416628] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:16:04 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff})
[ 1768.456619] loop3: detected capacity change from 0 to 512
[ 1768.476320] 9pnet_fd: p9_fd_create_tcp (29457): problem connecting socket to 127.0.0.1
[ 1768.479152] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1768.479869] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1768.511299] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:16:04 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
05:16:04 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x3a020000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1768.550040] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1768.578898] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1768.579610] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:16:15 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:16:15 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x300000000000000, 0x0, 0x0}, 0x58)
05:16:15 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:15 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2})
05:16:15 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:15 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x1e020000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:15 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x5425, 0x7)
05:16:15 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x3f000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1779.478341] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1779.479047] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:16:15 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6})
[ 1779.520934] loop5: detected capacity change from 0 to 512
[ 1779.528630] 9pnet_fd: p9_fd_create_tcp (29704): problem connecting socket to 127.0.0.1
[ 1779.540977] loop3: detected capacity change from 0 to 512
[ 1779.572847] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
[ 1779.576166] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1779.576850] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1779.579108] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1779.594776] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1779.595458] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:16:15 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x400000000000000, 0x0, 0x0}, 0x58)
05:16:15 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:16:15 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1779.689695] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:16:15 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:15 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
[ 1779.756757] 9pnet_fd: p9_fd_create_tcp (29844): problem connecting socket to 127.0.0.1
[ 1779.786701] loop5: detected capacity change from 0 to 512
05:16:15 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x40000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1779.805408] loop3: detected capacity change from 0 to 512
[ 1779.811837] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1779.812693] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1779.812999] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1779.883418] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:16:15 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x1fffefff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:15 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x800000000000000, 0x0, 0x0}, 0x58)
05:16:16 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:16:16 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x84020000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1779.943718] 9pnet_fd: p9_fd_create_tcp (30060): problem connecting socket to 127.0.0.1
[ 1779.987837] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:16:26 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x5425, 0x7)
05:16:26 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:26 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:26 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})
05:16:26 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:16:26 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x900000000000000, 0x0, 0x0}, 0x58)
05:16:26 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0x881a0000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:26 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b00"/120, 0x78, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1790.676278] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1790.677551] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1790.690331] loop3: detected capacity change from 0 to 512
[ 1790.704447] 9pnet_fd: p9_fd_create_tcp (30261): problem connecting socket to 127.0.0.1
[ 1790.715440] loop5: detected capacity change from 0 to 512
[ 1790.726188] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:16:26 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd})
[ 1790.808838] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:16:26 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:16:26 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:26 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x1000000000000000, 0x0, 0x0}, 0x58)
05:16:26 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0xa2020000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:26 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b00"/120, 0x78, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1790.874053] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1790.932329] loop3: detected capacity change from 0 to 512
[ 1790.942891] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1790.944180] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1790.963232] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
[ 1791.000042] loop5: detected capacity change from 0 to 512
[ 1791.005792] 9pnet_fd: p9_fd_create_tcp (30287): problem connecting socket to 127.0.0.1
05:16:27 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600})
05:16:27 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x1100000000000000, 0x0, 0x0}, 0x58)
[ 1791.163339] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1791.188125] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1791.189349] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1791.268684] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:16:38 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000440))
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x5425, 0x7)
05:16:38 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900})
05:16:38 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:38 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:16:38 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x2000000000000000, 0x0, 0x0}, 0x58)
05:16:38 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0xf4000000}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:38 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b00"/120, 0x78, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:38 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x28000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1802.567062] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1802.568672] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1802.603345] loop5: detected capacity change from 0 to 512
[ 1802.633734] loop3: detected capacity change from 0 to 512
[ 1802.654886] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
[ 1802.663920] 9pnet_fd: p9_fd_create_tcp (30506): problem connecting socket to 127.0.0.1
05:16:38 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00})
05:16:38 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00000000000000, 0x0, 0x0}, 0x58)
[ 1802.746578] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:16:38 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:16:38 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1802.808694] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1802.810138] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1802.856832] 9pnet_fd: p9_fd_create_tcp (30577): problem connecting socket to 127.0.0.1
05:16:38 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000})
[ 1802.918211] loop3: detected capacity change from 0 to 512
[ 1802.932140] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1802.960797] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
[ 1803.021163] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1803.022395] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1803.032582] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1803.034003] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:16:50 executing program 2:
openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10b000, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:16:50 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000000000000, 0x0, 0x0}, 0x58)
05:16:50 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0xffefff1f}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:50 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x3f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:16:50 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000", 0x84, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:50 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:16:50 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:50 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfd})
[ 1814.384808] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1814.385509] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1814.388559] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1814.389212] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1814.392833] loop3: detected capacity change from 0 to 512
[ 1814.404691] loop5: detected capacity change from 0 to 512
[ 1814.411170] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:16:50 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000})
[ 1814.456302] 9pnet_fd: p9_fd_create_tcp (30746): problem connecting socket to 127.0.0.1
[ 1814.471760] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:16:50 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x443e000000000000, 0x0, 0x0}, 0x58)
05:16:50 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1814.561686] loop3: detected capacity change from 0 to 512
[ 1814.562934] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1814.564353] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1814.565681] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:16:50 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1814.604193] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1814.605407] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:16:50 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:16:50 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000", 0x84, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1814.684626] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1814.742354] 9pnet_fd: p9_fd_create_tcp (30873): problem connecting socket to 127.0.0.1
05:17:01 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:01 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:17:01 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x8a02000000000000, 0x0, 0x0}, 0x58)
05:17:01 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {0xffffffff}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:17:01 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000})
05:17:01 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:17:01 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000", 0x84, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:01 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
[ 1825.433479] loop3: detected capacity change from 0 to 512
[ 1825.483149] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1825.484405] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1825.489776] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1825.497167] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1825.498378] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1825.505865] loop5: detected capacity change from 0 to 512
05:17:01 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000})
05:17:01 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xe4ffffff00000000, 0x0, 0x0}, 0x58)
[ 1825.622660] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:17:01 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:17:01 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1825.666419] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1825.725130] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1825.725980] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:17:01 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1825.743165] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1825.744006] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:17:01 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000})
[ 1825.807651] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:17:01 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f74", 0x8a, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:01 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2, 0x0, 0x0}, 0x58)
05:17:01 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x6c020000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1825.873249] loop3: detected capacity change from 0 to 512
[ 1825.882175] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1825.882917] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1825.906157] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:17:12 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000})
05:17:12 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:17:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xfeffffff00000000, 0x0, 0x0}, 0x58)
05:17:12 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xb8010000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:17:12 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:17:12 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3, 0x0, 0x0}, 0x58)
05:17:12 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:12 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f74", 0x8a, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1836.182435] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1836.183151] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:17:12 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000})
05:17:12 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1836.237598] loop3: detected capacity change from 0 to 512
[ 1836.259592] loop5: detected capacity change from 0 to 512
[ 1836.263563] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
[ 1836.286517] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1836.287245] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1836.292144] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1836.292818] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1836.324934] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:17:12 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000})
05:17:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xffcf64c7507f0000, 0x0, 0x0}, 0x58)
05:17:12 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4, 0x0, 0x0}, 0x58)
05:17:12 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1836.396155] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1836.396853] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1836.449355] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:17:12 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:17:12 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000})
05:17:12 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f74", 0x8a, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1836.473847] loop3: detected capacity change from 0 to 512
[ 1836.505364] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1836.506052] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1836.511417] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:17:12 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xf4000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:17:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xffefff1f00000000, 0x0, 0x0}, 0x58)
[ 1836.556569] loop5: detected capacity change from 0 to 512
05:17:12 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffdff0})
[ 1836.608668] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:17:12 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x5, 0x0, 0x0}, 0x58)
[ 1836.674049] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1836.675321] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1836.763797] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:17:21 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:17:21 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655f", 0x30, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:21 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:17:21 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xffefff1f, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:17:21 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f", 0x8d, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:21 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffffff600000, 0x0, 0x0}, 0x58)
05:17:21 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0dfff7f})
05:17:21 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x6, 0x0, 0x0}, 0x58)
[ 1845.523289] loop3: detected capacity change from 0 to 512
[ 1845.533368] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1845.534009] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1845.549985] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:17:21 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1845.587579] loop5: detected capacity change from 0 to 512
05:17:21 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff})
05:17:21 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xfffffffffffff000, 0x0, 0x0}, 0x58)
[ 1845.646881] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1845.647613] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:17:21 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655f", 0x30, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1845.686657] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:17:21 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x7, 0x0, 0x0}, 0x58)
05:17:21 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff})
[ 1845.752854] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1845.767182] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1845.767848] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1845.791602] loop3: detected capacity change from 0 to 512
[ 1845.827258] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:17:33 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:17:33 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:17:33 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655f", 0x30, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:33 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x58)
05:17:33 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x100000800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:17:33 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f", 0x8d, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:33 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff})
05:17:33 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8, 0x0, 0x0}, 0x58)
[ 1857.772782] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1857.774064] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1857.775322] loop3: detected capacity change from 0 to 512
[ 1857.795946] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:17:33 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0)
05:17:33 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x58)
[ 1857.809986] loop5: detected capacity change from 0 to 512
05:17:33 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffefffff})
[ 1857.893829] 9pnet_virtio: no channels available for device 127.0.0.1
05:17:34 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x58)
05:17:34 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000", 0x48, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1857.951060] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:17:34 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0)
[ 1858.024144] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1858.025481] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:17:34 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x10000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1858.118798] loop3: detected capacity change from 0 to 512
[ 1858.151804] 9pnet_virtio: no channels available for device 127.0.0.1
[ 1858.158524] EXT4-fs error (device loop3): __ext4_fill_super:5513: inode #2: comm syz-executor.3: iget: special inode unallocated
[ 1858.163907] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1858.167903] EXT4-fs (loop3): get root inode failed
[ 1858.168859] EXT4-fs (loop3): mount failed
05:17:46 executing program 2:
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:17:46 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffefff})
05:17:46 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x58)
05:17:46 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f", 0x8d, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:46 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x9, 0x0, 0x0}, 0x58)
05:17:46 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0)
05:17:46 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000", 0x48, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:46 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x7f953f2cefff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:17:46 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xb, 0x0, 0x0}, 0x58)
[ 1870.146043] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1870.147696] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1870.190665] loop3: detected capacity change from 0 to 512
[ 1870.205612] loop5: detected capacity change from 0 to 512
[ 1870.226600] 9pnet_virtio: no channels available for device 127.0.0.1
[ 1870.236234] EXT4-fs error (device loop3): __ext4_fill_super:5513: inode #2: comm syz-executor.3: iget: special inode unallocated
[ 1870.245917] EXT4-fs (loop3): get root inode failed
[ 1870.246608] EXT4-fs (loop3): mount failed
05:17:46 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd})
05:17:46 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x58)
[ 1870.318276] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:17:46 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1870.327508] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1870.328881] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1870.339951] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1870.341223] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:17:46 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000", 0x48, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:46 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f7379", 0x8f, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1870.393823] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1870.439044] loop5: detected capacity change from 0 to 512
05:17:46 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5})
[ 1870.505562] loop3: detected capacity change from 0 to 512
05:17:46 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11, 0x0, 0x0}, 0x58)
[ 1870.508752] 9pnet_fd: p9_fd_create_tcp (32890): problem connecting socket to 127.0.0.1
[ 1870.524851] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1870.550533] EXT4-fs error (device loop3): __ext4_fill_super:5513: inode #2: comm syz-executor.3: iget: special inode unallocated
[ 1870.557788] EXT4-fs (loop3): get root inode failed
[ 1870.558715] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1870.560124] EXT4-fs (loop3): mount failed
[ 1870.564720] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1870.565462] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1870.567145] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1870.567824] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:17:57 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x58)
05:17:57 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:17:57 executing program 2:
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:17:57 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f7379", 0x8f, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:57 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x28, 0x0, 0x0}, 0x58)
05:17:57 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6})
05:17:57 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x2001000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:17:57 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:57 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x58)
[ 1881.758443] loop3: detected capacity change from 0 to 512
[ 1881.777637] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1881.778980] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1881.783684] EXT4-fs (loop3): invalid first ino: 0
[ 1881.788285] loop5: detected capacity change from 0 to 512
[ 1881.800987] 9pnet_fd: p9_fd_create_tcp (33031): problem connecting socket to 127.0.0.1
05:17:57 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:17:57 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x58)
[ 1881.906558] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:17:58 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff})
05:17:58 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:17:58 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x2020000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1882.042060] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:17:58 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f7379", 0x8f, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1882.064650] loop3: detected capacity change from 0 to 512
[ 1882.084980] EXT4-fs (loop3): invalid first ino: 0
05:17:58 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf4, 0x0, 0x0}, 0x58)
[ 1882.104150] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1882.104955] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1882.114692] loop5: detected capacity change from 0 to 512
[ 1882.116446] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1882.117203] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1882.138246] 9pnet_fd: p9_fd_create_tcp (33249): problem connecting socket to 127.0.0.1
[ 1882.148786] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1882.187565] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:18:08 executing program 2:
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:18:08 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x23a, 0x0, 0x0}, 0x58)
05:18:08 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:18:08 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0}, 0x58)
05:18:08 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:18:08 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}, {@access_user}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:18:08 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x8000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:18:08 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
[ 1891.951808] loop5: detected capacity change from 0 to 512
[ 1891.958662] 9pnet_fd: p9_fd_create_tcp (33457): problem connecting socket to 127.0.0.1
[ 1891.964996] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
05:18:08 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x28a}, 0x58)
[ 1891.987302] loop3: detected capacity change from 0 to 512
05:18:08 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}, {@fscache}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1892.012056] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1892.013340] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1892.019675] EXT4-fs (loop3): invalid first ino: 0
05:18:08 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:18:08 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x58)
05:18:08 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2})
[ 1892.095707] 9pnet_fd: p9_fd_create_tcp (33553): problem connecting socket to 127.0.0.1
[ 1892.109553] loop5: detected capacity change from 0 to 512
05:18:08 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1892.126471] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
05:18:08 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x9}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
[ 1892.204907] 9pnet_fd: p9_fd_create_tcp (33671): problem connecting socket to 127.0.0.1
[ 1892.251433] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1892.252679] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1892.263985] loop3: detected capacity change from 0 to 512
[ 1892.310948] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1892.360599] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:18:18 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x58)
05:18:18 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:18:18 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6})
05:18:18 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x284, 0x0, 0x0}, 0x58)
05:18:18 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00))
05:18:18 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:18:18 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x8000001000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:18:18 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1902.258752] loop3: detected capacity change from 0 to 512
[ 1902.290661] EXT4-fs (loop3): invalid first ino: 0
[ 1902.301634] 9pnet_fd: p9_fd_create_tcp (33699): problem connecting socket to 127.0.0.1
[ 1902.309935] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1902.310678] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1902.319849] loop5: detected capacity change from 0 to 512
05:18:18 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x58)
[ 1902.361670] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
05:18:18 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:18:18 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2a2, 0x0, 0x0}, 0x58)
05:18:18 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
05:18:18 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x10100000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:18:18 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:18:18 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, 0x0)
[ 1902.516811] loop3: detected capacity change from 0 to 512
[ 1902.519526] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1902.520710] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1902.535479] loop5: detected capacity change from 0 to 512
[ 1902.547876] EXT4-fs (loop3): invalid first ino: 0
[ 1902.558059] 9pnet_fd: p9_fd_create_tcp (34105): problem connecting socket to 127.0.0.1
05:18:18 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x58)
05:18:18 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})
[ 1902.689961] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1902.691193] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1902.695986] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1902.697179] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:18:29 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:18:29 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd})
05:18:29 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x300, 0x0, 0x0}, 0x58)
05:18:29 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:18:29 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, 0x0)
05:18:29 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:18:29 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3e44}, 0x58)
05:18:29 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x10400000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1913.023933] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1913.024745] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1913.058823] loop3: detected capacity change from 0 to 512
[ 1913.061743] loop5: detected capacity change from 0 to 512
[ 1913.072762] 9pnet_fd: p9_fd_create_tcp (34165): problem connecting socket to 127.0.0.1
[ 1913.090043] EXT4-fs (loop3): invalid first ino: 0
05:18:29 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600})
05:18:29 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x58)
05:18:29 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x500, 0x0, 0x0}, 0x58)
05:18:29 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:18:29 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, 0x0)
05:18:29 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1913.232546] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1913.233291] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:18:29 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:18:29 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x58)
[ 1913.289478] loop5: detected capacity change from 0 to 512
[ 1913.317712] 9pnet_fd: p9_fd_create_tcp (34367): problem connecting socket to 127.0.0.1
[ 1913.339467] loop3: detected capacity change from 0 to 512
[ 1913.356553] EXT4-fs (loop3): unsupported inode size: 0
[ 1913.357529] EXT4-fs (loop3): blocksize: 2048
05:18:39 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x200000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:18:39 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:18:39 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900})
05:18:39 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:18:39 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x443e}, 0x58)
05:18:39 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x600, 0x0, 0x0}, 0x58)
05:18:39 executing program 5:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0)
05:18:39 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1923.383199] 9pnet_virtio: no channels available for device 127.0.0.1
[ 1923.383959] loop3: detected capacity change from 0 to 512
[ 1923.394695] EXT4-fs (loop3): unsupported inode size: 0
[ 1923.395166] EXT4-fs (loop3): blocksize: 2048
05:18:39 executing program 5:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x600, 0x0, 0x0, 0x0})
[ 1923.450694] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1923.451989] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:18:39 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:18:39 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x60ff}, 0x58)
[ 1923.463007] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1923.464262] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1923.477536] 9pnet_fd: p9_fd_create_tcp (34590): problem connecting socket to 127.0.0.1
[ 1923.511154] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1923.511835] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1923.518976] loop3: detected capacity change from 0 to 512
[ 1923.545313] EXT4-fs (loop3): unsupported inode size: 0
[ 1923.545758] EXT4-fs (loop3): blocksize: 2048
05:18:39 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00})
05:18:39 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 1)
05:18:39 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:18:39 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1923.604756] FAULT_INJECTION: forcing a failure.
[ 1923.604756] name failslab, interval 1, probability 0, space 0, times 0
[ 1923.605800] CPU: 1 UID: 0 PID: 34748 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1923.605817] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1923.605826] Call Trace:
[ 1923.605831]
[ 1923.605836] dump_stack_lvl+0xfa/0x120
[ 1923.605858] should_fail_ex+0x4d7/0x5e0
[ 1923.605877] should_failslab+0xc2/0x120
[ 1923.605893] __kmalloc_cache_noprof+0x81/0x6b0
[ 1923.605911] ? lock_acquire+0x15e/0x2f0
[ 1923.605930] ? task_active_pid_ns+0xa9/0xd0
[ 1923.605944] ? alloc_name+0x41/0x110
[ 1923.605966] ? alloc_name+0x41/0x110
[ 1923.605983] alloc_name+0x41/0x110
[ 1923.606000] __x64_sys_memfd_create+0x130/0x280
[ 1923.606019] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 1923.606037] ? lock_release+0xc8/0x290
[ 1923.606061] do_syscall_64+0xbf/0x430
[ 1923.606082] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1923.606095] RIP: 0033:0x7f41071ecb19
[ 1923.606105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1923.606122] RSP: 002b:00007f4104761f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1923.606134] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f41071ecb19
[ 1923.606143] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f41072460fb
[ 1923.606150] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 1923.606158] R10: 000000000000000b R11: 0000000000000246 R12: 0000000008100000
[ 1923.606166] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 1923.606186]
05:18:39 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1923.688018] 9pnet_fd: p9_fd_create_tcp (34780): problem connecting socket to 127.0.0.1
[ 1923.694749] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1923.695441] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:18:39 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x300000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:18:51 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x400000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:18:51 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000})
05:18:51 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:18:51 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:18:51 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:18:51 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8a02}, 0x58)
05:18:51 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 2)
05:18:51 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x700, 0x0, 0x0}, 0x58)
[ 1934.999067] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1934.999950] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:18:51 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfd})
[ 1935.076017] loop5: detected capacity change from 0 to 512
[ 1935.083185] 9pnet_fd: p9_fd_create_tcp (34975): problem connecting socket to 127.0.0.1
[ 1935.084488] loop3: detected capacity change from 0 to 512
[ 1935.115560] EXT4-fs (loop3): unsupported inode size: 0
[ 1935.116726] EXT4-fs (loop3): blocksize: 2048
[ 1935.126297] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1935.127524] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1935.145952] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:18:51 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf000}, 0x58)
05:18:51 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:18:51 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:18:51 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000})
05:18:51 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x900, 0x0, 0x0}, 0x58)
05:18:51 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 3)
[ 1935.247917] loop3: detected capacity change from 0 to 512
[ 1935.254413] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:18:51 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x500000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1935.284261] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1935.292348] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1935.293114] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1935.371361] 9pnet_fd: p9_fd_create_tcp (35150): problem connecting socket to 127.0.0.1
[ 1935.421861] FAULT_INJECTION: forcing a failure.
[ 1935.421861] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1935.423889] CPU: 1 UID: 0 PID: 35181 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1935.423920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1935.423933] Call Trace:
[ 1935.423940]
[ 1935.423949] dump_stack_lvl+0xfa/0x120
[ 1935.423984] should_fail_ex+0x4d7/0x5e0
[ 1935.424015] strncpy_from_user+0x3b/0x2f0
[ 1935.424053] alloc_name+0x78/0x110
[ 1935.424095] __x64_sys_memfd_create+0x130/0x280
[ 1935.424131] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 1935.424164] ? lock_release+0xc8/0x290
[ 1935.424209] do_syscall_64+0xbf/0x430
[ 1935.424239] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1935.424263] RIP: 0033:0x7f41071ecb19
[ 1935.424280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1935.424301] RSP: 002b:00007f4104761f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1935.424323] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f41071ecb19
[ 1935.424338] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f41072460fb
[ 1935.424351] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 1935.424365] R10: 000000000000000b R11: 0000000000000246 R12: 0000000008100000
[ 1935.424378] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 1935.424413]
05:19:02 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20010}, 0x58)
05:19:02 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
05:19:02 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:19:02 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x600000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:19:02 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:19:02 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 4)
05:19:02 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xb00, 0x0, 0x0}, 0x58)
05:19:02 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000})
[ 1945.978672] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1945.979400] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1945.998159] 9pnet_fd: p9_fd_create_tcp (35369): problem connecting socket to 127.0.0.1
05:19:02 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000})
[ 1946.024734] loop3: detected capacity change from 0 to 512
[ 1946.026705] FAULT_INJECTION: forcing a failure.
[ 1946.026705] name failslab, interval 1, probability 0, space 0, times 0
[ 1946.028550] CPU: 1 UID: 0 PID: 35376 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1946.028581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1946.028595] Call Trace:
[ 1946.028603]
[ 1946.028611] dump_stack_lvl+0xfa/0x120
[ 1946.028645] should_fail_ex+0x4d7/0x5e0
[ 1946.028675] ? shmem_alloc_inode+0x27/0x50
[ 1946.028705] should_failslab+0xc2/0x120
[ 1946.028730] kmem_cache_alloc_lru_noprof+0x84/0x690
[ 1946.028763] ? perf_trace_lock+0xbc/0x5f0
[ 1946.028807] ? shmem_alloc_inode+0x27/0x50
[ 1946.028835] shmem_alloc_inode+0x27/0x50
[ 1946.028864] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 1946.028893] alloc_inode+0x67/0x250
[ 1946.028923] new_inode+0x1e/0x160
[ 1946.028954] __shmem_get_inode+0x17c/0xea0
[ 1946.028997] __shmem_file_setup+0x108/0x370
[ 1946.029028] ? alloc_fd+0x2c1/0x560
[ 1946.029053] alloc_file+0x2ae/0x590
[ 1946.029098] __x64_sys_memfd_create+0x193/0x280
[ 1946.029134] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 1946.029178] ? lock_release+0xc8/0x290
[ 1946.029221] do_syscall_64+0xbf/0x430
[ 1946.029250] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1946.029272] RIP: 0033:0x7f41071ecb19
[ 1946.029289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1946.029310] RSP: 002b:00007f4104761f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1946.029332] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f41071ecb19
[ 1946.029346] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f41072460fb
[ 1946.029360] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 1946.029372] R10: 000000000000000b R11: 0000000000000246 R12: 0000000008100000
[ 1946.029385] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 1946.029420]
[ 1946.052135] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
[ 1946.057936] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1946.058620] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:19:02 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:19:02 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000})
05:19:02 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20200}, 0x58)
[ 1946.163061] 9pnet_fd: p9_fd_create_tcp (35416): problem connecting socket to 127.0.0.1
05:19:02 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 5)
05:19:02 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00))
[ 1946.174845] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1946.176025] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1946.232474] loop3: detected capacity change from 0 to 512
[ 1946.234428] loop5: detected capacity change from 0 to 512
[ 1946.245559] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
[ 1946.311802] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1946.339810] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:19:10 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:19:10 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x58)
05:19:10 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100, 0x0, 0x0}, 0x58)
05:19:10 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_eq}]}})
05:19:10 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, 0x0)
05:19:10 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x700000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:19:10 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 6)
05:19:10 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000})
[ 1954.483479] 9pnet_fd: p9_fd_create_tcp (35605): problem connecting socket to 127.0.0.1
[ 1954.512915] loop3: detected capacity change from 0 to 512
[ 1954.526641] FAULT_INJECTION: forcing a failure.
[ 1954.526641] name failslab, interval 1, probability 0, space 0, times 0
[ 1954.528239] CPU: 1 UID: 0 PID: 35615 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1954.528271] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1954.528286] Call Trace:
[ 1954.528294]
[ 1954.528303] dump_stack_lvl+0xfa/0x120
[ 1954.528339] should_fail_ex+0x4d7/0x5e0
[ 1954.528371] ? security_inode_alloc+0x3e/0x130
[ 1954.528396] should_failslab+0xc2/0x120
[ 1954.528424] kmem_cache_alloc_noprof+0x80/0x690
[ 1954.528456] ? __pfx_map_id_range_down+0x10/0x10
[ 1954.528495] ? security_inode_alloc+0x3e/0x130
[ 1954.528518] security_inode_alloc+0x3e/0x130
[ 1954.528545] inode_init_always_gfp+0xc9d/0xff0
[ 1954.528577] alloc_inode+0x8d/0x250
[ 1954.528608] new_inode+0x1e/0x160
[ 1954.528641] __shmem_get_inode+0x17c/0xea0
[ 1954.528689] __shmem_file_setup+0x108/0x370
[ 1954.528724] ? alloc_fd+0x2c1/0x560
[ 1954.528750] alloc_file+0x2ae/0x590
[ 1954.528792] __x64_sys_memfd_create+0x193/0x280
[ 1954.528830] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 1954.528865] ? lock_release+0xc8/0x290
[ 1954.528913] do_syscall_64+0xbf/0x430
[ 1954.528945] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1954.528970] RIP: 0033:0x7f41071ecb19
[ 1954.528988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1954.529012] RSP: 002b:00007f4104761f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1954.529036] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f41071ecb19
[ 1954.529054] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f41072460fb
[ 1954.529070] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 1954.529092] R10: 000000000000000b R11: 0000000000000246 R12: 0000000008100000
[ 1954.529107] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 1954.529144]
[ 1954.572124] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1954.572892] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:19:10 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:19:10 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, 0x0)
05:19:10 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x58)
05:19:10 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}]}})
05:19:10 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 7)
05:19:10 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000})
[ 1954.694640] loop3: detected capacity change from 0 to 512
05:19:10 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x58)
[ 1954.727181] loop5: detected capacity change from 0 to 512
[ 1954.732286] 9pnet_fd: p9_fd_create_tcp (35781): problem connecting socket to 127.0.0.1
[ 1954.756024] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1954.831618] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1954.832787] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1954.846790] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:19:19 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000})
05:19:19 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1a88, 0x0, 0x0}, 0x58)
05:19:19 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x900000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:19:19 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x7)
05:19:19 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}]}})
05:19:19 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, 0x0)
05:19:19 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ff1f}, 0x58)
05:19:19 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 8)
[ 1963.101373] loop3: detected capacity change from 0 to 512
[ 1963.114216] FAULT_INJECTION: forcing a failure.
[ 1963.114216] name failslab, interval 1, probability 0, space 0, times 0
[ 1963.115449] CPU: 0 UID: 0 PID: 35851 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1963.115467] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1963.115476] Call Trace:
[ 1963.115481]
[ 1963.115487] dump_stack_lvl+0xfa/0x120
[ 1963.115513] should_fail_ex+0x4d7/0x5e0
[ 1963.115537] ? __d_alloc+0x34/0xa20
[ 1963.115551] should_failslab+0xc2/0x120
[ 1963.115569] kmem_cache_alloc_lru_noprof+0x84/0x690
[ 1963.115591] ? find_held_lock+0x2b/0x80
[ 1963.115623] ? __d_alloc+0x34/0xa20
[ 1963.115637] __d_alloc+0x34/0xa20
[ 1963.115651] ? mpol_shared_policy_init+0x24f/0x390
[ 1963.115681] d_alloc_pseudo+0x1d/0xc0
[ 1963.115702] alloc_file_pseudo+0xbe/0x220
[ 1963.115725] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 1963.115744] ? __shmem_get_inode+0x69f/0xea0
[ 1963.115780] __shmem_file_setup+0x1a8/0x370
[ 1963.115800] ? alloc_fd+0x2c1/0x560
[ 1963.115820] alloc_file+0x2ae/0x590
[ 1963.115849] __x64_sys_memfd_create+0x193/0x280
[ 1963.115873] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 1963.115892] ? lock_release+0xc8/0x290
[ 1963.115928] do_syscall_64+0xbf/0x430
[ 1963.115950] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1963.115964] RIP: 0033:0x7f41071ecb19
[ 1963.115976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1963.115989] RSP: 002b:00007f4104761f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1963.116002] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f41071ecb19
[ 1963.116011] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f41072460fb
[ 1963.116019] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 1963.116027] R10: 000000000000000b R11: 0000000000000246 R12: 0000000008100000
[ 1963.116035] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 1963.116077]
[ 1963.144869] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1963.145578] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:19:19 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 9)
05:19:19 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000})
[ 1963.229666] 9pnet_fd: p9_fd_create_tcp (35952): problem connecting socket to 127.0.0.1
05:19:19 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}, 0x58)
[ 1963.313009] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1963.314218] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:19:19 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000, 0x0, 0x0}, 0x58)
05:19:19 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
[ 1963.352808] loop5: detected capacity change from 0 to 512
05:19:19 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}]}})
05:19:19 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffdff0})
[ 1963.474801] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:19:19 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xb00000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1963.515535] 9pnet_fd: p9_fd_create_tcp (36073): problem connecting socket to 127.0.0.1
[ 1963.543665] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1963.545010] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:19:19 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0dfff7f})
05:19:19 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x58)
[ 1963.681643] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1963.735998] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1963.737450] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:19:38 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}})
05:19:38 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff})
05:19:38 executing program 3:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000})
05:19:38 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x1100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:19:38 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
05:19:38 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 10)
05:19:38 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x58)
05:19:38 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2800, 0x0, 0x0}, 0x58)
[ 1982.019713] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1982.020696] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1982.031405] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1982.032351] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1982.049959] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1982.051292] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1982.075017] FAULT_INJECTION: forcing a failure.
[ 1982.075017] name failslab, interval 1, probability 0, space 0, times 0
[ 1982.076856] CPU: 1 UID: 0 PID: 36321 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1982.076892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1982.076909] Call Trace:
[ 1982.076919]
[ 1982.076929] dump_stack_lvl+0xfa/0x120
[ 1982.076969] should_fail_ex+0x4d7/0x5e0
[ 1982.077005] ? alloc_empty_file+0x58/0x1e0
[ 1982.077037] should_failslab+0xc2/0x120
[ 1982.077068] kmem_cache_alloc_noprof+0x80/0x690
[ 1982.077112] ? d_instantiate+0x79/0xa0
[ 1982.077151] ? alloc_empty_file+0x58/0x1e0
[ 1982.077182] alloc_empty_file+0x58/0x1e0
[ 1982.077219] alloc_file_pseudo+0x12b/0x220
[ 1982.077256] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 1982.077305] __shmem_file_setup+0x1a8/0x370
05:19:38 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff})
[ 1982.077344] ? alloc_fd+0x2c1/0x560
[ 1982.077372] alloc_file+0x2ae/0x590
[ 1982.077417] __x64_sys_memfd_create+0x193/0x280
[ 1982.077458] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 1982.077497] ? lock_release+0xc8/0x290
[ 1982.077548] do_syscall_64+0xbf/0x430
[ 1982.077583] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1982.077624] RIP: 0033:0x7f41071ecb19
[ 1982.077644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
05:19:38 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x58)
[ 1982.077669] RSP: 002b:00007f4104761f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1982.077694] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f41071ecb19
[ 1982.077712] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f41072460fb
[ 1982.077728] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 1982.077744] R10: 000000000000000b R11: 0000000000000246 R12: 0000000008100000
[ 1982.077759] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 1982.077799]
[ 1982.147501] 9pnet_fd: p9_fd_create_tcp (36315): problem connecting socket to 127.0.0.1
05:19:38 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 1)
05:19:38 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7)
[ 1982.248209] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1982.249579] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:19:38 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 11)
[ 1982.269051] FAULT_INJECTION: forcing a failure.
[ 1982.269051] name failslab, interval 1, probability 0, space 0, times 0
[ 1982.270269] CPU: 0 UID: 0 PID: 36471 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1982.270289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1982.270299] Call Trace:
[ 1982.270306]
[ 1982.270313] dump_stack_lvl+0xfa/0x120
[ 1982.270341] should_fail_ex+0x4d7/0x5e0
[ 1982.270369] should_failslab+0xc2/0x120
[ 1982.270389] __kmalloc_cache_noprof+0x81/0x6b0
[ 1982.270412] ? lock_acquire+0x15e/0x2f0
[ 1982.270435] ? task_active_pid_ns+0xa9/0xd0
[ 1982.270452] ? alloc_name+0x41/0x110
[ 1982.270486] ? alloc_name+0x41/0x110
[ 1982.270508] alloc_name+0x41/0x110
[ 1982.270533] __x64_sys_memfd_create+0x130/0x280
[ 1982.270559] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 1982.270581] ? lock_release+0xc8/0x290
[ 1982.270621] do_syscall_64+0xbf/0x430
[ 1982.270645] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1982.270660] RIP: 0033:0x7f920613ab19
[ 1982.270673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1982.270687] RSP: 002b:00007f92036aff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1982.270701] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f920613ab19
[ 1982.270711] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f92061940fb
[ 1982.270719] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff
[ 1982.270728] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000
[ 1982.270737] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 1982.270779]
05:19:38 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3a02, 0x0, 0x0}, 0x58)
05:19:38 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 2)
05:19:38 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x58)
05:19:38 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff})
[ 1982.397765] loop5: detected capacity change from 0 to 512
[ 1982.442740] loop3: detected capacity change from 0 to 512
[ 1982.472646] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1982.479714] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1982.513130] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1982.513820] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1982.542593] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 1982.597856] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:19:49 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 3)
05:19:49 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x0)
05:19:49 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 12)
05:19:49 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 1)
05:19:49 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x1e02000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:19:49 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00, 0x0, 0x0}, 0x58)
05:19:49 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffefffff})
05:19:49 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x58)
[ 1993.316499] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1993.317734] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1993.342634] FAULT_INJECTION: forcing a failure.
[ 1993.342634] name failslab, interval 1, probability 0, space 0, times 0
[ 1993.344358] CPU: 1 UID: 0 PID: 36657 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1993.344389] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1993.344403] Call Trace:
[ 1993.344412]
[ 1993.344421] dump_stack_lvl+0xfa/0x120
[ 1993.344456] should_fail_ex+0x4d7/0x5e0
[ 1993.344486] ? security_file_alloc+0x35/0x130
[ 1993.344514] should_failslab+0xc2/0x120
[ 1993.344540] kmem_cache_alloc_noprof+0x80/0x690
[ 1993.344573] ? __create_object+0x59/0x80
[ 1993.344610] ? security_file_alloc+0x35/0x130
[ 1993.344635] security_file_alloc+0x35/0x130
[ 1993.344664] init_file+0x95/0x4c0
[ 1993.344695] alloc_empty_file+0x76/0x1e0
[ 1993.344727] alloc_file_pseudo+0x12b/0x220
[ 1993.344759] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 1993.344802] __shmem_file_setup+0x1a8/0x370
[ 1993.344836] ? alloc_fd+0x2c1/0x560
[ 1993.344861] alloc_file+0x2ae/0x590
[ 1993.344898] __x64_sys_memfd_create+0x193/0x280
[ 1993.344934] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 1993.344968] ? lock_release+0xc8/0x290
[ 1993.345012] do_syscall_64+0xbf/0x430
[ 1993.345043] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1993.345066] RIP: 0033:0x7f41071ecb19
[ 1993.345091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1993.345113] RSP: 002b:00007f4104761f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1993.345135] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f41071ecb19
[ 1993.345150] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f41072460fb
[ 1993.345164] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 1993.345178] R10: 000000000000000b R11: 0000000000000246 R12: 0000000008100000
[ 1993.345191] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 1993.345227]
[ 1993.411578] FAULT_INJECTION: forcing a failure.
[ 1993.411578] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1993.413505] CPU: 0 UID: 0 PID: 36684 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1993.413539] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1993.413555] Call Trace:
[ 1993.413564]
[ 1993.413575] dump_stack_lvl+0xfa/0x120
[ 1993.413621] should_fail_ex+0x4d7/0x5e0
[ 1993.413666] strncpy_from_user+0x3b/0x2f0
[ 1993.413720] alloc_name+0x78/0x110
[ 1993.413780] __x64_sys_memfd_create+0x130/0x280
[ 1993.413825] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 1993.413861] ? lock_release+0xc8/0x290
[ 1993.413929] do_syscall_64+0xbf/0x430
[ 1993.413969] entry_SYSCALL_64_after_hwframe+0x77/0x7f
05:19:49 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffefff})
[ 1993.413996] RIP: 0033:0x7f920613ab19
[ 1993.414016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
05:19:49 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 2)
[ 1993.414040] RSP: 002b:00007f92036aff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1993.414063] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f920613ab19
[ 1993.414087] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f92061940fb
[ 1993.414101] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff
[ 1993.414117] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000
[ 1993.414132] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 1993.414201]
05:19:49 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x58)
05:19:49 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 13)
05:19:49 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000, 0x0, 0x0}, 0x58)
[ 1993.578485] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 1993.579741] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 1993.609883] 9pnet_fd: p9_fd_create_tcp (36858): problem connecting socket to 127.0.0.1
05:19:49 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 4)
05:19:49 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x2000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 1993.695553] loop5: detected capacity change from 0 to 512
[ 1993.765127] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 1993.801431] FAULT_INJECTION: forcing a failure.
[ 1993.801431] name failslab, interval 1, probability 0, space 0, times 0
[ 1993.803173] CPU: 1 UID: 0 PID: 36964 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 1993.803204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1993.803219] Call Trace:
[ 1993.803227]
[ 1993.803237] dump_stack_lvl+0xfa/0x120
[ 1993.803272] should_fail_ex+0x4d7/0x5e0
[ 1993.803304] ? shmem_alloc_inode+0x27/0x50
[ 1993.803335] should_failslab+0xc2/0x120
[ 1993.803361] kmem_cache_alloc_lru_noprof+0x84/0x690
[ 1993.803396] ? perf_trace_lock+0xbc/0x5f0
[ 1993.803440] ? shmem_alloc_inode+0x27/0x50
[ 1993.803469] shmem_alloc_inode+0x27/0x50
[ 1993.803498] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 1993.803528] alloc_inode+0x67/0x250
[ 1993.803559] new_inode+0x1e/0x160
[ 1993.803590] __shmem_get_inode+0x17c/0xea0
[ 1993.803633] __shmem_file_setup+0x108/0x370
[ 1993.803666] ? alloc_fd+0x2c1/0x560
[ 1993.803691] alloc_file+0x2ae/0x590
[ 1993.803730] __x64_sys_memfd_create+0x193/0x280
[ 1993.803766] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 1993.803799] ? lock_release+0xc8/0x290
[ 1993.803843] do_syscall_64+0xbf/0x430
[ 1993.803874] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1993.803897] RIP: 0033:0x7f920613ab19
[ 1993.803915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1993.803937] RSP: 002b:00007f92036aff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1993.803959] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f920613ab19
[ 1993.803974] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f92061940fb
[ 1993.803988] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff
[ 1993.804001] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000
[ 1993.804015] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 1993.804050]
[ 1993.841457] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:20:01 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x58)
05:20:01 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd})
05:20:01 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x2800000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:20:01 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8402, 0x0, 0x0}, 0x58)
05:20:01 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 3)
05:20:01 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 14)
05:20:01 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 5)
05:20:01 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x0) (fail_nth: 1)
[ 2005.905320] FAULT_INJECTION: forcing a failure.
[ 2005.905320] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 2005.907344] CPU: 1 UID: 0 PID: 37086 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2005.907376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2005.907391] Call Trace:
[ 2005.907400]
[ 2005.907410] dump_stack_lvl+0xfa/0x120
[ 2005.907447] should_fail_ex+0x4d7/0x5e0
[ 2005.907481] should_fail_alloc_page+0xe0/0x110
[ 2005.907511] prepare_alloc_pages+0x1eb/0x550
[ 2005.907545] __alloc_frozen_pages_noprof+0x17f/0x1f10
[ 2005.907577] ? find_held_lock+0x2b/0x80
[ 2005.907609] ? lock_release+0xc8/0x290
[ 2005.907651] ? perf_trace_lock_acquire+0xd0/0x710
[ 2005.907689] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10
[ 2005.907723] ? perf_trace_lock+0xbc/0x5f0
[ 2005.907763] ? __pfx_perf_trace_lock+0x10/0x10
[ 2005.907797] ? lock_is_held_type+0x9e/0x120
[ 2005.907828] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 2005.907860] ? policy_nodemask+0xeb/0x4e0
[ 2005.907896] alloc_pages_mpol+0xed/0x340
[ 2005.907928] ? __pfx_alloc_pages_mpol+0x10/0x10
[ 2005.907956] ? filemap_get_entry+0x1bb/0x3b0
[ 2005.907983] ? __pfx_filemap_get_entry+0x10/0x10
[ 2005.908018] folio_alloc_mpol_noprof+0x38/0xa0
[ 2005.908056] shmem_alloc_folio+0x11b/0x140
[ 2005.908102] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0
[ 2005.908145] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10
[ 2005.908177] ? __pfx_perf_trace_lock+0x10/0x10
[ 2005.908210] ? simple_xattr_get+0x173/0x1d0
[ 2005.908247] shmem_write_begin+0x194/0x3b0
[ 2005.908275] ? __pfx_shmem_write_begin+0x10/0x10
[ 2005.908298] ? timestamp_truncate+0x1eb/0x2f0
[ 2005.908325] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190
[ 2005.908356] ? __pfx_timestamp_truncate+0x10/0x10
[ 2005.908388] generic_perform_write+0x391/0x810
[ 2005.908438] ? __pfx_generic_perform_write+0x10/0x10
[ 2005.908477] ? inode_needs_update_time.part.0+0x170/0x270
[ 2005.908514] shmem_file_write_iter+0x111/0x140
[ 2005.908551] vfs_write+0xbe9/0x1150
[ 2005.908576] ? __pfx_shmem_file_write_iter+0x10/0x10
[ 2005.908610] ? __fget_files+0x34/0x3b0
[ 2005.908633] ? __pfx_vfs_write+0x10/0x10
[ 2005.908686] __x64_sys_pwrite64+0x1f1/0x260
[ 2005.908712] ? __pfx___x64_sys_pwrite64+0x10/0x10
[ 2005.908751] do_syscall_64+0xbf/0x430
[ 2005.908782] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2005.908806] RIP: 0033:0x7f410719fab7
[ 2005.908824] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b
[ 2005.908846] RSP: 002b:00007f4104761f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012
[ 2005.908869] RAX: ffffffffffffffda RBX: 00007f4107236970 RCX: 00007f410719fab7
[ 2005.908884] RDX: 0000000000000090 RSI: 0000000020010000 RDI: 0000000000000005
[ 2005.908898] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 2005.908913] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005
[ 2005.908927] R13: 0000000000000005 R14: 0000000020000200 R15: 0000000000000000
[ 2005.908964]
[ 2005.950541] loop3: detected capacity change from 0 to 512
[ 2005.960889] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2005.962252] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:20:02 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000200}, 0x58)
[ 2005.997068] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 2006.000209] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2006.000638] FAULT_INJECTION: forcing a failure.
[ 2006.000638] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2006.001475] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 2006.003316] CPU: 0 UID: 0 PID: 37142 Comm: syz-executor.7 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2006.003353] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2006.003371] Call Trace:
[ 2006.003379]
[ 2006.003389] dump_stack_lvl+0xfa/0x120
[ 2006.003426] should_fail_ex+0x4d7/0x5e0
[ 2006.003464] _copy_from_user+0x30/0xd0
[ 2006.003492] memdup_user+0x7e/0xe0
[ 2006.003525] strndup_user+0x78/0xe0
[ 2006.003560] __x64_sys_mount+0x136/0x310
[ 2006.003589] ? __pfx___x64_sys_mount+0x10/0x10
[ 2006.003615] ? lock_release+0xc8/0x290
[ 2006.003671] do_syscall_64+0xbf/0x430
[ 2006.003703] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2006.003733] RIP: 0033:0x7f47720dbb19
[ 2006.003754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2006.003776] RSP: 002b:00007f476f630188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 2006.003798] RAX: ffffffffffffffda RBX: 00007f47721ef020 RCX: 00007f47720dbb19
[ 2006.003818] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000
[ 2006.003837] RBP: 00007f476f6301d0 R08: 0000000020000540 R09: 0000000000000000
[ 2006.003854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2006.003868] R13: 00007fff368ec4df R14: 00007f476f630300 R15: 0000000000022000
[ 2006.003904]
[ 2006.026014] loop5: detected capacity change from 0 to 512
[ 2006.038456] EXT4-fs (loop5): VFS: Can't find ext4 filesystem
05:20:02 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 6)
05:20:02 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 15)
[ 2006.151723] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 2006.193565] FAULT_INJECTION: forcing a failure.
[ 2006.193565] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2006.195996] CPU: 0 UID: 0 PID: 37093 Comm: syz-executor.2 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2006.196031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2006.196046] Call Trace:
[ 2006.196055]
[ 2006.196066] dump_stack_lvl+0xfa/0x120
[ 2006.196114] should_fail_ex+0x4d7/0x5e0
[ 2006.196158] _copy_to_user+0x32/0xd0
[ 2006.196196] simple_read_from_buffer+0xe0/0x180
[ 2006.196244] proc_fail_nth_read+0x18a/0x240
[ 2006.196282] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 2006.196319] ? security_file_permission+0x22/0x90
[ 2006.196357] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 2006.196391] vfs_read+0x1eb/0xc70
[ 2006.196439] ? __pfx_vfs_read+0x10/0x10
[ 2006.196471] ? lock_release+0xc8/0x290
[ 2006.196528] ? __fget_files+0x20d/0x3b0
[ 2006.196588] ksys_read+0x121/0x240
[ 2006.196614] ? __pfx_ksys_read+0x10/0x10
[ 2006.196672] do_syscall_64+0xbf/0x430
[ 2006.196709] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2006.196734] RIP: 0033:0x7f71e9c0b69c
[ 2006.196753] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 2006.196776] RSP: 002b:00007f71e71ce170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 2006.196798] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f71e9c0b69c
[ 2006.196813] RDX: 000000000000000f RSI: 00007f71e71ce1e0 RDI: 0000000000000005
[ 2006.196827] RBP: 00007f71e71ce1d0 R08: 0000000000000000 R09: 0000000000000000
[ 2006.196841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2006.196854] R13: 00007ffdcf9157cf R14: 00007f71e71ce300 R15: 0000000000022000
[ 2006.196922]
05:20:02 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x881a, 0x0, 0x0}, 0x58)
05:20:02 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5})
05:20:02 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x3f00000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:20:02 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 4)
[ 2006.276706] FAULT_INJECTION: forcing a failure.
[ 2006.276706] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2006.278550] CPU: 1 UID: 0 PID: 37302 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2006.278582] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2006.278595] Call Trace:
[ 2006.278603]
[ 2006.278613] dump_stack_lvl+0xfa/0x120
[ 2006.278650] should_fail_ex+0x4d7/0x5e0
[ 2006.278675] ? page_copy_sane+0xce/0x2b0
[ 2006.278703] copy_folio_from_iter_atomic+0x3d3/0x18c0
[ 2006.278745] ? simple_xattr_get+0x173/0x1d0
[ 2006.278780] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10
[ 2006.278807] ? shmem_write_begin+0x1ab/0x3b0
[ 2006.278837] ? __pfx_shmem_write_begin+0x10/0x10
[ 2006.278859] ? timestamp_truncate+0x1eb/0x2f0
[ 2006.278887] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190
[ 2006.278918] ? __pfx_timestamp_truncate+0x10/0x10
[ 2006.278950] generic_perform_write+0x1d7/0x810
[ 2006.279000] ? __pfx_generic_perform_write+0x10/0x10
[ 2006.279040] ? inode_needs_update_time.part.0+0x170/0x270
[ 2006.279085] shmem_file_write_iter+0x111/0x140
[ 2006.279129] vfs_write+0xbe9/0x1150
[ 2006.279156] ? __pfx_shmem_file_write_iter+0x10/0x10
[ 2006.279189] ? __fget_files+0x34/0x3b0
[ 2006.279212] ? __pfx_vfs_write+0x10/0x10
[ 2006.279264] __x64_sys_pwrite64+0x1f1/0x260
[ 2006.279291] ? __pfx___x64_sys_pwrite64+0x10/0x10
[ 2006.279330] do_syscall_64+0xbf/0x430
[ 2006.279362] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2006.279385] RIP: 0033:0x7f410719fab7
[ 2006.279404] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b
[ 2006.279427] RSP: 002b:00007f4104761f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012
[ 2006.279449] RAX: ffffffffffffffda RBX: 00007f4107236970 RCX: 00007f410719fab7
[ 2006.279465] RDX: 0000000000000090 RSI: 0000000020010000 RDI: 0000000000000005
[ 2006.279479] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 2006.279494] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005
[ 2006.279507] R13: 0000000000000005 R14: 0000000020000200 R15: 0000000000000000
[ 2006.279543]
05:20:02 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x58)
[ 2006.354432] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2006.354604] loop5: detected capacity change from 0 to 512
[ 2006.355655] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 2006.418019] FAULT_INJECTION: forcing a failure.
[ 2006.418019] name failslab, interval 1, probability 0, space 0, times 0
[ 2006.419745] CPU: 1 UID: 0 PID: 37335 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2006.419776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2006.419789] Call Trace:
[ 2006.419798]
[ 2006.419807] dump_stack_lvl+0xfa/0x120
[ 2006.419840] should_fail_ex+0x4d7/0x5e0
[ 2006.419872] ? security_inode_alloc+0x3e/0x130
[ 2006.419896] should_failslab+0xc2/0x120
[ 2006.419924] kmem_cache_alloc_noprof+0x80/0x690
[ 2006.419954] ? __pfx_map_id_range_down+0x10/0x10
[ 2006.419992] ? security_inode_alloc+0x3e/0x130
[ 2006.420014] security_inode_alloc+0x3e/0x130
[ 2006.420040] inode_init_always_gfp+0xc9d/0xff0
[ 2006.420071] alloc_inode+0x8d/0x250
[ 2006.420108] new_inode+0x1e/0x160
[ 2006.420140] __shmem_get_inode+0x17c/0xea0
[ 2006.420184] __shmem_file_setup+0x108/0x370
[ 2006.420217] ? alloc_fd+0x2c1/0x560
[ 2006.420242] alloc_file+0x2ae/0x590
[ 2006.420283] __x64_sys_memfd_create+0x193/0x280
[ 2006.420319] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 2006.420353] ? lock_release+0xc8/0x290
[ 2006.420398] do_syscall_64+0xbf/0x430
[ 2006.420430] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2006.420453] RIP: 0033:0x7f920613ab19
[ 2006.420470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2006.420493] RSP: 002b:00007f92036aff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 2006.420514] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f920613ab19
[ 2006.420530] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f92061940fb
[ 2006.420544] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff
[ 2006.420558] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000
[ 2006.420571] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 2006.420607]
[ 2006.594890] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 2006.674534] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:20:14 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 16)
05:20:14 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xa202, 0x0, 0x0}, 0x58)
05:20:14 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1fffefff}, 0x58)
05:20:14 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x4000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:20:14 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5425, 0x0)
05:20:14 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6})
05:20:14 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 5)
05:20:14 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 7)
[ 2018.748875] 9pnet_fd: p9_fd_create_tcp (37430): problem connecting socket to 127.0.0.1
[ 2018.763672] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2018.764387] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:20:14 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 6)
[ 2018.819790] FAULT_INJECTION: forcing a failure.
[ 2018.819790] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2018.821032] CPU: 0 UID: 0 PID: 37514 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2018.821050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2018.821060] Call Trace:
[ 2018.821065]
[ 2018.821076] dump_stack_lvl+0xfa/0x120
[ 2018.821104] should_fail_ex+0x4d7/0x5e0
[ 2018.821123] ? page_copy_sane+0xce/0x2b0
[ 2018.821143] copy_folio_from_iter_atomic+0x3d3/0x18c0
[ 2018.821191] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10
[ 2018.821208] ? shmem_write_begin+0x1ab/0x3b0
[ 2018.821228] ? __pfx_shmem_write_begin+0x10/0x10
[ 2018.821242] ? timestamp_truncate+0x1eb/0x2f0
[ 2018.821260] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190
[ 2018.821278] ? __pfx_timestamp_truncate+0x10/0x10
[ 2018.821304] generic_perform_write+0x1d7/0x810
[ 2018.821347] ? __pfx_generic_perform_write+0x10/0x10
[ 2018.821374] ? inode_needs_update_time.part.0+0x170/0x270
[ 2018.821406] shmem_file_write_iter+0x111/0x140
[ 2018.821433] vfs_write+0xbe9/0x1150
[ 2018.821451] ? __pfx_shmem_file_write_iter+0x10/0x10
[ 2018.821472] ? __fget_files+0x34/0x3b0
[ 2018.821487] ? __pfx_vfs_write+0x10/0x10
[ 2018.821542] __x64_sys_pwrite64+0x1f1/0x260
[ 2018.821560] ? __pfx___x64_sys_pwrite64+0x10/0x10
[ 2018.821595] do_syscall_64+0xbf/0x430
[ 2018.821617] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2018.821631] RIP: 0033:0x7f410719fab7
[ 2018.821643] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b
[ 2018.821656] RSP: 002b:00007f4104761f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012
[ 2018.821668] RAX: ffffffffffffffda RBX: 00007f4107236970 RCX: 00007f410719fab7
[ 2018.821677] RDX: 0000000000000020 RSI: 0000000020010300 RDI: 0000000000000005
[ 2018.821685] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 2018.821693] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000005
[ 2018.821701] R13: 0000000000000005 R14: 0000000020000230 R15: 0000000000000002
[ 2018.821739]
[ 2018.846340] loop3: detected capacity change from 0 to 512
05:20:14 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff})
[ 2018.852502] loop5: detected capacity change from 0 to 512
05:20:14 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1ffff000}, 0x58)
05:20:15 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x6c02000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 2018.906657] FAULT_INJECTION: forcing a failure.
[ 2018.906657] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2018.908820] CPU: 1 UID: 0 PID: 37599 Comm: syz-executor.7 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2018.908856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2018.908873] Call Trace:
[ 2018.908882]
[ 2018.908892] dump_stack_lvl+0xfa/0x120
[ 2018.908932] should_fail_ex+0x4d7/0x5e0
[ 2018.908967] _copy_from_user+0x30/0xd0
[ 2018.908999] memdup_user+0x7e/0xe0
[ 2018.909031] strndup_user+0x78/0xe0
[ 2018.909064] __x64_sys_mount+0x17f/0x310
[ 2018.909104] ? __pfx___x64_sys_mount+0x10/0x10
[ 2018.909132] ? lock_release+0xc8/0x290
[ 2018.909184] do_syscall_64+0xbf/0x430
[ 2018.909218] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2018.909245] RIP: 0033:0x7f47720dbb19
[ 2018.909266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2018.909290] RSP: 002b:00007f476f651188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 2018.909316] RAX: ffffffffffffffda RBX: 00007f47721eef60 RCX: 00007f47720dbb19
[ 2018.909333] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000
[ 2018.909350] RBP: 00007f476f6511d0 R08: 0000000020000540 R09: 0000000000000000
[ 2018.909366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2018.909381] R13: 00007fff368ec4df R14: 00007f476f651300 R15: 0000000000022000
[ 2018.909422]
[ 2018.929789] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 2018.982812] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2018.983547] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:20:15 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 7)
[ 2018.993317] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:20:15 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf400, 0x0, 0x0}, 0x58)
05:20:15 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 17)
05:20:15 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 8)
05:20:15 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x58)
[ 2019.066708] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 2019.074953] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:20:15 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000001080), 0x7ffffffe, 0x52bc41)
r1 = dup(r0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f00000021c0)={0x2, 0x1, {0xffffffffffffffff, 0x3, 0x976f, 0x3, 0x5}, 0x40})
r2 = socket$inet(0x2, 0xa, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x5411, &(0x7f0000000040)={'lo\x00'})
ioctl$F2FS_IOC_START_VOLATILE_WRITE(r2, 0xf503, 0x0)
recvmsg$unix(r1, &(0x7f0000001000)={&(0x7f0000002240)=@abs, 0x6e, &(0x7f0000003580)=[{&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/160, 0xa0}, {&(0x7f0000003380)=""/87, 0x57}, {&(0x7f0000003400)=""/93, 0x5d}, {&(0x7f0000003480)=""/199, 0xc7}], 0x5, &(0x7f0000003600)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x108}, 0x101a2)
connect$unix(r3, &(0x7f0000003740)=@abs={0x1, 0x0, 0x4e20}, 0x6e)
syz_open_dev$sg(&(0x7f0000002180), 0xffff, 0x0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
[ 2019.122996] FAULT_INJECTION: forcing a failure.
[ 2019.122996] name failslab, interval 1, probability 0, space 0, times 0
[ 2019.124891] CPU: 1 UID: 0 PID: 37714 Comm: syz-executor.7 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2019.124929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2019.124945] Call Trace:
[ 2019.124953]
[ 2019.124963] dump_stack_lvl+0xfa/0x120
[ 2019.125000] should_fail_ex+0x4d7/0x5e0
[ 2019.125034] should_failslab+0xc2/0x120
[ 2019.125063] __kmalloc_cache_noprof+0x81/0x6b0
[ 2019.125102] ? __might_fault+0xe0/0x190
[ 2019.125140] ? copy_mount_options+0x55/0x180
[ 2019.125180] ? copy_mount_options+0x55/0x180
[ 2019.125210] ? memdup_user+0x95/0xe0
[ 2019.125236] copy_mount_options+0x55/0x180
[ 2019.125271] __x64_sys_mount+0x1ab/0x310
[ 2019.125300] ? __pfx___x64_sys_mount+0x10/0x10
[ 2019.125326] ? lock_release+0xc8/0x290
[ 2019.125375] do_syscall_64+0xbf/0x430
[ 2019.125408] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2019.125432] RIP: 0033:0x7f47720dbb19
[ 2019.125451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2019.125480] RSP: 002b:00007f476f651188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 2019.125511] RAX: ffffffffffffffda RBX: 00007f47721eef60 RCX: 00007f47720dbb19
[ 2019.125527] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000
[ 2019.125542] RBP: 00007f476f6511d0 R08: 0000000020000540 R09: 0000000000000000
[ 2019.125557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2019.125572] R13: 00007fff368ec4df R14: 00007f476f651300 R15: 0000000000022000
[ 2019.125610]
05:20:15 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x2, 0x0)
[ 2019.198531] FAULT_INJECTION: forcing a failure.
[ 2019.198531] name failslab, interval 1, probability 0, space 0, times 0
[ 2019.199703] CPU: 0 UID: 0 PID: 37808 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2019.199721] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2019.199731] Call Trace:
[ 2019.199736]
[ 2019.199742] dump_stack_lvl+0xfa/0x120
[ 2019.199768] should_fail_ex+0x4d7/0x5e0
[ 2019.199791] ? __d_alloc+0x34/0xa20
[ 2019.199806] should_failslab+0xc2/0x120
[ 2019.199824] kmem_cache_alloc_lru_noprof+0x84/0x690
[ 2019.199846] ? find_held_lock+0x2b/0x80
[ 2019.199878] ? __d_alloc+0x34/0xa20
[ 2019.199893] __d_alloc+0x34/0xa20
[ 2019.199907] ? mpol_shared_policy_init+0x24f/0x390
[ 2019.199937] d_alloc_pseudo+0x1d/0xc0
[ 2019.199958] alloc_file_pseudo+0xbe/0x220
[ 2019.199981] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 2019.200001] ? __shmem_get_inode+0x69f/0xea0
[ 2019.200037] __shmem_file_setup+0x1a8/0x370
[ 2019.200056] ? alloc_fd+0x2c1/0x560
[ 2019.200081] alloc_file+0x2ae/0x590
[ 2019.200110] __x64_sys_memfd_create+0x193/0x280
[ 2019.200134] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 2019.200154] ? lock_release+0xc8/0x290
[ 2019.200189] do_syscall_64+0xbf/0x430
[ 2019.200211] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2019.200225] RIP: 0033:0x7f920613ab19
[ 2019.200237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2019.200250] RSP: 002b:00007f92036aff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 2019.200263] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f920613ab19
[ 2019.200272] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f92061940fb
[ 2019.200280] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff
[ 2019.200288] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000
[ 2019.200296] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 2019.200333]
[ 2019.209117] FAULT_INJECTION: forcing a failure.
[ 2019.209117] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 2019.220875] CPU: 1 UID: 0 PID: 37815 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2019.220911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2019.220926] Call Trace:
[ 2019.220936]
[ 2019.220947] dump_stack_lvl+0xfa/0x120
[ 2019.220985] should_fail_ex+0x4d7/0x5e0
[ 2019.221021] should_fail_alloc_page+0xe0/0x110
[ 2019.221053] prepare_alloc_pages+0x1eb/0x550
[ 2019.221095] __alloc_frozen_pages_noprof+0x17f/0x1f10
[ 2019.221142] ? perf_trace_lock_acquire+0xd0/0x710
[ 2019.221185] ? perf_trace_lock_acquire+0xd0/0x710
[ 2019.221226] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10
[ 2019.221264] ? perf_trace_lock+0xbc/0x5f0
[ 2019.221307] ? __pfx_perf_trace_lock+0x10/0x10
[ 2019.221346] ? lock_is_held_type+0x9e/0x120
[ 2019.221378] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 2019.221412] ? policy_nodemask+0xeb/0x4e0
[ 2019.221452] alloc_pages_mpol+0xed/0x340
[ 2019.221487] ? __pfx_alloc_pages_mpol+0x10/0x10
[ 2019.221519] ? filemap_get_entry+0x1bb/0x3b0
[ 2019.221547] ? __pfx_filemap_get_entry+0x10/0x10
[ 2019.221585] folio_alloc_mpol_noprof+0x38/0xa0
[ 2019.221627] shmem_alloc_folio+0x11b/0x140
[ 2019.221669] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0
[ 2019.221714] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10
[ 2019.221749] ? __pfx_perf_trace_lock+0x10/0x10
[ 2019.221796] shmem_write_begin+0x194/0x3b0
[ 2019.221827] ? __pfx_shmem_write_begin+0x10/0x10
[ 2019.221852] ? timestamp_truncate+0x1eb/0x2f0
[ 2019.221882] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190
[ 2019.221915] ? __pfx_timestamp_truncate+0x10/0x10
[ 2019.221950] generic_perform_write+0x391/0x810
[ 2019.222004] ? __pfx_generic_perform_write+0x10/0x10
[ 2019.222047] ? inode_needs_update_time.part.0+0x170/0x270
[ 2019.222100] shmem_file_write_iter+0x111/0x140
[ 2019.222140] vfs_write+0xbe9/0x1150
[ 2019.222168] ? __pfx_shmem_file_write_iter+0x10/0x10
[ 2019.222214] ? __fget_files+0x34/0x3b0
[ 2019.222245] ? __pfx_vfs_write+0x10/0x10
[ 2019.222324] __x64_sys_pwrite64+0x1f1/0x260
[ 2019.222359] ? __pfx___x64_sys_pwrite64+0x10/0x10
[ 2019.222413] do_syscall_64+0xbf/0x430
[ 2019.222459] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2019.222495] RIP: 0033:0x7f410719fab7
[ 2019.222520] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b
[ 2019.222555] RSP: 002b:00007f4104761f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012
[ 2019.222579] RAX: ffffffffffffffda RBX: 00007f4107236970 RCX: 00007f410719fab7
[ 2019.222597] RDX: 000000000000001d RSI: 0000000020011500 RDI: 0000000000000005
[ 2019.222612] RBP: 000000000000000b R08: 0000000000000000 R09: ffffffffffffffff
[ 2019.222627] R10: 0000000000002200 R11: 0000000000000293 R12: 0000000000000005
[ 2019.222642] R13: 0000000000000005 R14: 0000000020000248 R15: 0000000000000003
[ 2019.222681]
[ 2019.301711] loop5: detected capacity change from 0 to 512
[ 2019.342123] EXT4-fs error (device loop5): __ext4_fill_super:5513: inode #2: comm syz-executor.5: iget: special inode unallocated
[ 2019.349564] EXT4-fs (loop5): get root inode failed
[ 2019.349985] EXT4-fs (loop5): mount failed
05:20:27 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xb801000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:20:27 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 18)
05:20:27 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x101101)
ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000003c0)={{0xa8a, 0x40}, 0x100, './file0\x00'})
r1 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
dup(r1)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r3 = dup2(r2, r2)
r4 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r3, 0x4, 0x2400)
dup2(r4, r3)
ioctl$SG_IO(r3, 0x2285, &(0x7f00000010c0)={0x0, 0xfffffffe, 0xa, 0x0, @buffer={0x0, 0x5b, &(0x7f00000001c0)=""/91}, &(0x7f0000000040)="03ceb710044b00000000", 0x0, 0x0, 0x0, 0x20000003, 0x0})
05:20:27 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x58)
05:20:27 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x4b47, 0x0)
05:20:27 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 9)
05:20:27 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 8)
05:20:27 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20010, 0x0, 0x0}, 0x58)
[ 2031.947903] loop3: detected capacity change from 0 to 512
[ 2031.949479] loop5: detected capacity change from 0 to 512
[ 2031.953125] 9pnet_fd: p9_fd_create_tcp (37890): problem connecting socket to 127.0.0.1
[ 2032.058866] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 2032.079298] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:20:28 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x58)
05:20:28 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 9)
05:20:28 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x4b49, 0x0)
05:20:28 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x10000)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x100)
r3 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/user\x00')
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffffffffffe, 0xfffffffffffffcb8, 0x4, @scatter={0x4, 0x0, &(0x7f0000000400)=[{&(0x7f0000000200)=""/196, 0xc4}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f0000000640)=""/27, 0xd}]}, &(0x7f0000000440)="9d156115d77383262532b3824eba8f3f739fe249cc28fff913f1df58a0e7d999a8da4296d36e7f8a446ee55ebebaee7d05f963fb8bacfd42bc9144aaa963449460c322bc1de749636ea9c3163389f951af755050ca38f522313f8e75424f4dd51716181c65774c0c400b186e9d7b6e675abf506ab245d26f47e9877bb85fd869ff0a3ff765a8c90f47330c63d052ee5edc68188bc3b4dac6446c7d77981b1f36f159a9b30d17e41915949b14b68729bd5bdb1193186260e31ce7cffac03950c624179e0b8d16f5dee5", &(0x7f0000000540)=""/39, 0xc8, 0x20, 0xffffffffffffffff, &(0x7f0000000580)})
clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0})
ppoll(&(0x7f0000000100)=[{r1, 0x14000}, {r2, 0x4}, {r3, 0x4000}, {r4, 0x8400}], 0x4, &(0x7f0000000180)={r5, r6+10000000}, &(0x7f00000001c0)={[0x100000001]}, 0x8)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @scatter={0x7, 0x0, &(0x7f0000002300)=[{&(0x7f0000001000)=""/9, 0x9}, {&(0x7f0000001080)=""/44, 0x2c}, {&(0x7f0000002180)=""/46, 0x2e}, {&(0x7f00000021c0)=""/65, 0x41}, {&(0x7f0000002240)=""/70, 0x46}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/59, 0x3b}]}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x4, 0x10, 0x0, 0x0})
r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r8 = dup2(r7, r7)
r9 = openat(r8, &(0x7f0000000080)='./file0\x00', 0x20100, 0xde4b9dde4210a8ed)
r10 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, r9, 0x0)
dup2(r10, r8)
ioctl$SG_GET_PACK_ID(r8, 0x227c, &(0x7f0000000300))
[ 2032.187945] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:20:28 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 10)
05:20:28 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20200, 0x0, 0x0}, 0x58)
05:20:28 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 19)
[ 2032.239819] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 2032.243711] FAULT_INJECTION: forcing a failure.
[ 2032.243711] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2032.245330] CPU: 1 UID: 0 PID: 38107 Comm: syz-executor.7 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2032.245359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2032.245372] Call Trace:
[ 2032.245380]
[ 2032.245389] dump_stack_lvl+0xfa/0x120
[ 2032.245422] should_fail_ex+0x4d7/0x5e0
[ 2032.245451] _copy_from_user+0x30/0xd0
[ 2032.245476] copy_mount_options+0x76/0x180
[ 2032.245507] __x64_sys_mount+0x1ab/0x310
[ 2032.245531] ? __pfx___x64_sys_mount+0x10/0x10
[ 2032.245554] ? lock_release+0xc8/0x290
[ 2032.245595] do_syscall_64+0xbf/0x430
[ 2032.245622] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2032.245643] RIP: 0033:0x7f47720dbb19
[ 2032.245659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2032.245679] RSP: 002b:00007f476f651188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 2032.245699] RAX: ffffffffffffffda RBX: 00007f47721eef60 RCX: 00007f47720dbb19
[ 2032.245713] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000
[ 2032.245725] RBP: 00007f476f6511d0 R08: 0000000020000540 R09: 0000000000000000
[ 2032.245738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2032.245750] R13: 00007fff368ec4df R14: 00007f476f651300 R15: 0000000000022000
[ 2032.245782]
05:20:28 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xf400000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:20:28 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5409, 0x0)
[ 2032.333981] 9pnet_fd: p9_fd_create_tcp (38107): problem connecting socket to 127.0.0.1
[ 2032.343337] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2032.344585] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 2032.359801] FAULT_INJECTION: forcing a failure.
[ 2032.359801] name failslab, interval 1, probability 0, space 0, times 0
[ 2032.361470] CPU: 1 UID: 0 PID: 38117 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2032.361510] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2032.361523] Call Trace:
[ 2032.361530]
[ 2032.361538] dump_stack_lvl+0xfa/0x120
[ 2032.361570] should_fail_ex+0x4d7/0x5e0
[ 2032.361598] ? alloc_empty_file+0x58/0x1e0
[ 2032.361624] should_failslab+0xc2/0x120
[ 2032.361648] kmem_cache_alloc_noprof+0x80/0x690
[ 2032.361677] ? d_instantiate+0x79/0xa0
[ 2032.361708] ? alloc_empty_file+0x58/0x1e0
[ 2032.361732] alloc_empty_file+0x58/0x1e0
[ 2032.361760] alloc_file_pseudo+0x12b/0x220
[ 2032.361789] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 2032.361827] __shmem_file_setup+0x1a8/0x370
[ 2032.361859] ? alloc_fd+0x2c1/0x560
[ 2032.361881] alloc_file+0x2ae/0x590
[ 2032.361916] __x64_sys_memfd_create+0x193/0x280
[ 2032.361948] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 2032.361978] ? lock_release+0xc8/0x290
[ 2032.362018] do_syscall_64+0xbf/0x430
[ 2032.362046] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2032.362072] RIP: 0033:0x7f920613ab19
[ 2032.362089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2032.362109] RSP: 002b:00007f92036aff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 2032.362128] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f920613ab19
[ 2032.362142] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f92061940fb
[ 2032.362154] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff
[ 2032.362166] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000
[ 2032.362179] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 2032.362210]
[ 2033.100108] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2033.100823] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:20:39 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x40002144)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000001000))
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
05:20:39 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x443e0000}, 0x58)
05:20:39 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x540b, 0x0)
05:20:39 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 20)
05:20:39 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 11)
05:20:39 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 10)
05:20:39 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x80000, 0x0, 0x0}, 0x58)
05:20:39 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xffef2c3f957f0000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 2043.163879] FAULT_INJECTION: forcing a failure.
[ 2043.163879] name failslab, interval 1, probability 0, space 0, times 0
[ 2043.165627] CPU: 1 UID: 0 PID: 38334 Comm: syz-executor.7 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2043.165659] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2043.165673] Call Trace:
[ 2043.165681]
[ 2043.165690] dump_stack_lvl+0xfa/0x120
[ 2043.165726] should_fail_ex+0x4d7/0x5e0
[ 2043.165756] ? getname_flags.part.0+0x48/0x540
[ 2043.165786] should_failslab+0xc2/0x120
[ 2043.165813] kmem_cache_alloc_noprof+0x80/0x690
[ 2043.165856] ? getname_flags.part.0+0x48/0x540
[ 2043.165883] getname_flags.part.0+0x48/0x540
[ 2043.165918] getname_flags+0x95/0xe0
[ 2043.165940] user_path_at+0x27/0x90
[ 2043.165964] __x64_sys_mount+0x1fb/0x310
[ 2043.165991] ? __pfx___x64_sys_mount+0x10/0x10
[ 2043.166029] do_syscall_64+0xbf/0x430
[ 2043.166060] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2043.166091] RIP: 0033:0x7f47720dbb19
[ 2043.166109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2043.166131] RSP: 002b:00007f476f651188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 2043.166153] RAX: ffffffffffffffda RBX: 00007f47721eef60 RCX: 00007f47720dbb19
[ 2043.166168] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000
[ 2043.166182] RBP: 00007f476f6511d0 R08: 0000000020000540 R09: 0000000000000000
[ 2043.166196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2043.166209] R13: 00007fff368ec4df R14: 00007f476f651300 R15: 0000000000022000
[ 2043.166245]
[ 2043.223756] loop3: detected capacity change from 0 to 512
[ 2043.255579] loop5: detected capacity change from 0 to 512
[ 2043.290052] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2043.291325] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:20:39 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8a020000}, 0x58)
[ 2043.307803] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2043.308989] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 2043.315998] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:20:39 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 11)
[ 2043.376289] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:20:39 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x540c, 0x0)
[ 2043.539043] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 2043.565427] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 2043.597634] 9pnet_fd: p9_fd_create_tcp (38559): problem connecting socket to 127.0.0.1
05:20:49 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xffefff1f00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:20:49 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 12)
05:20:49 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 21)
05:20:49 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
r2 = socket$inet(0x2, 0xa, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x5411, &(0x7f0000000040)={'lo\x00'})
r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r4 = dup2(r3, r3)
r5 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r5, r4)
ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r4, 0xc0189378, &(0x7f0000002180)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'})
ioctl$SG_IO(r6, 0x2285, &(0x7f00000026c0)={0x0, 0xfffffffffffffffb, 0x7b, 0x0, @buffer={0x0, 0x7e, &(0x7f00000028c0)=""/126}, &(0x7f00000027c0)="2856673b3ff46bc788a8e9e3d63c0c430fdc6cfd05d2eaaafd57e0a363b2d86c52645705afb62536c508c5a9712ec16fac20bc8b1f8fa47c36cf0f6a2766305043c9cb2f2f074dc1f5830a941d0552e5c4951847814b990c23da34292d1a771831d6e2a37dfa4064a5b030e0f7575c53a51bb842328578e2ea9d36", &(0x7f0000002580)=""/214, 0x0, 0x3, 0xfffffffe, &(0x7f0000002680)})
ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000001000)={'wg0\x00', 0x0})
write(r2, &(0x7f0000002740)="71a9dcf13f7d8aeb1bf880ada8b19e11dd011b4a7c1dec69dda0857685eb9a3f55d9d60fa78a158447839067e4e4ac0c9faac46baab6a59b5922ec43e6f599a45fbcd053e04d7f96144d001e52cb420bdf903d5bb1f77bd22305e16e7bad11be661cf46a4eaaafe856c37d7dc394046f1985", 0x72)
r8 = perf_event_open(&(0x7f0000002200)={0x3, 0x80, 0x1, 0xed, 0x1, 0x80, 0x0, 0x7fff, 0x41000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xaf, 0x2, @perf_bp={&(0x7f00000021c0)}, 0x4220, 0x400, 0x6ca9, 0x4, 0x4, 0x20000000, 0x3, 0x0, 0x7, 0x0, 0x401}, 0x0, 0xd, 0xffffffffffffffff, 0xa)
ioctl$FS_IOC_FIEMAP(r8, 0xc020660b, &(0x7f0000002280)={0x8, 0x0, 0x1, 0x10001, 0x3, [{0x0, 0x369, 0xffffffffffffff8a, '\x00', 0x3a4e}, {0x8, 0x80000000, 0x18a, '\x00', 0x4a00}, {0xffffffffffffffff, 0x2, 0xbed, '\x00', 0x4}]})
setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000001080)={@empty, @local, r7}, 0xc)
05:20:49 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 12)
05:20:49 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff}, 0x58)
05:20:49 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x540d, 0x0)
05:20:49 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x101000, 0x0, 0x0}, 0x58)
[ 2053.525506] loop5: detected capacity change from 0 to 512
[ 2053.559249] FAULT_INJECTION: forcing a failure.
[ 2053.559249] name failslab, interval 1, probability 0, space 0, times 0
[ 2053.560543] CPU: 0 UID: 0 PID: 38587 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2053.560562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2053.560571] Call Trace:
[ 2053.560576]
[ 2053.560582] dump_stack_lvl+0xfa/0x120
[ 2053.560609] should_fail_ex+0x4d7/0x5e0
[ 2053.560634] ? security_file_alloc+0x35/0x130
[ 2053.560651] should_failslab+0xc2/0x120
[ 2053.560670] kmem_cache_alloc_noprof+0x80/0x690
[ 2053.560692] ? __create_object+0x59/0x80
[ 2053.560723] ? security_file_alloc+0x35/0x130
[ 2053.560738] security_file_alloc+0x35/0x130
[ 2053.560757] init_file+0x95/0x4c0
[ 2053.560781] alloc_empty_file+0x76/0x1e0
[ 2053.560805] alloc_file_pseudo+0x12b/0x220
[ 2053.560828] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 2053.560865] __shmem_file_setup+0x1a8/0x370
[ 2053.560886] ? alloc_fd+0x2c1/0x560
[ 2053.560907] alloc_file+0x2ae/0x590
[ 2053.560936] __x64_sys_memfd_create+0x193/0x280
[ 2053.560960] ? __pfx___x64_sys_memfd_create+0x10/0x10
[ 2053.560979] ? lock_release+0xc8/0x290
[ 2053.561017] do_syscall_64+0xbf/0x430
[ 2053.561039] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2053.561053] RIP: 0033:0x7f920613ab19
[ 2053.561064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2053.561081] RSP: 002b:00007f92036aff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 2053.561094] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f920613ab19
[ 2053.561103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f92061940fb
[ 2053.561111] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff
[ 2053.561119] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000
[ 2053.561127] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00
[ 2053.561164]
[ 2053.573743] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2053.577859] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
05:20:49 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5412, 0x0)
05:20:49 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x58)
[ 2053.617960] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2053.619206] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 2053.630364] FAULT_INJECTION: forcing a failure.
[ 2053.630364] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2053.631377] CPU: 0 UID: 0 PID: 38621 Comm: syz-executor.7 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2053.631394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2053.631404] Call Trace:
[ 2053.631409]
[ 2053.631415] dump_stack_lvl+0xfa/0x120
[ 2053.631440] should_fail_ex+0x4d7/0x5e0
[ 2053.631466] strncpy_from_user+0x3b/0x2f0
[ 2053.631496] getname_flags.part.0+0x8d/0x540
[ 2053.631524] getname_flags+0x95/0xe0
[ 2053.631541] user_path_at+0x27/0x90
[ 2053.631558] __x64_sys_mount+0x1fb/0x310
[ 2053.631578] ? __pfx___x64_sys_mount+0x10/0x10
[ 2053.631612] do_syscall_64+0xbf/0x430
[ 2053.631634] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2053.631648] RIP: 0033:0x7f47720dbb19
[ 2053.631660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2053.631673] RSP: 002b:00007f476f651188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 2053.631686] RAX: ffffffffffffffda RBX: 00007f47721eef60 RCX: 00007f47720dbb19
[ 2053.631695] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000
[ 2053.631703] RBP: 00007f476f6511d0 R08: 0000000020000540 R09: 0000000000000000
[ 2053.631712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2053.631720] R13: 00007fff368ec4df R14: 00007f476f651300 R15: 0000000000022000
[ 2053.631757]
[ 2053.666463] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:20:49 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x104000, 0x0, 0x0}, 0x58)
05:20:49 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 13)
05:20:49 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 22)
[ 2053.748000] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 2053.822873] FAULT_INJECTION: forcing a failure.
[ 2053.822873] name failslab, interval 1, probability 0, space 0, times 0
[ 2053.824055] CPU: 0 UID: 0 PID: 38811 Comm: syz-executor.7 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2053.824076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2053.824085] Call Trace:
[ 2053.824090]
[ 2053.824096] dump_stack_lvl+0xfa/0x120
[ 2053.824122] should_fail_ex+0x4d7/0x5e0
[ 2053.824146] should_failslab+0xc2/0x120
[ 2053.824164] __kmalloc_cache_noprof+0x81/0x6b0
[ 2053.824184] ? __get_fs_type+0xe6/0x160
[ 2053.824201] ? alloc_fs_context+0x57/0xb20
[ 2053.824225] ? alloc_fs_context+0x57/0xb20
[ 2053.824238] alloc_fs_context+0x57/0xb20
[ 2053.824262] path_mount+0xd8d/0x2140
[ 2053.824282] ? trace_irq_enable.constprop.0+0xc2/0x100
[ 2053.824303] ? __pfx_path_mount+0x10/0x10
[ 2053.824319] ? kmem_cache_free+0x26f/0x500
[ 2053.824339] ? putname.part.0+0xc0/0x160
[ 2053.824361] ? getname_flags.part.0+0x1c6/0x540
[ 2053.824385] ? putname.part.0+0xc0/0x160
[ 2053.824410] __x64_sys_mount+0x293/0x310
[ 2053.824427] ? __pfx___x64_sys_mount+0x10/0x10
[ 2053.824460] do_syscall_64+0xbf/0x430
[ 2053.824481] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2053.824495] RIP: 0033:0x7f47720dbb19
[ 2053.824506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2053.824518] RSP: 002b:00007f476f651188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 2053.824531] RAX: ffffffffffffffda RBX: 00007f47721eef60 RCX: 00007f47720dbb19
[ 2053.824540] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000
[ 2053.824548] RBP: 00007f476f6511d0 R08: 0000000020000540 R09: 0000000000000000
[ 2053.824556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2053.824563] R13: 00007fff368ec4df R14: 00007f476f651300 R15: 0000000000022000
[ 2053.824599]
05:20:49 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5413, 0x0)
05:20:49 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffffffffffb, 0x11f, 0x0, @scatter={0x5, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)}, {&(0x7f00000000c0)=""/80, 0x50}, {&(0x7f0000003b00)=""/4096, 0x1000}, {&(0x7f0000000280)=""/177, 0xb1}, {&(0x7f0000000340)=""/182, 0xb6}]}, &(0x7f0000000140)="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", 0x0, 0x0, 0x13, 0x0, 0x0})
r2 = dup(r0)
ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000480)=""/107)
05:20:49 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 13)
[ 2053.860553] loop3: detected capacity change from 0 to 512
[ 2053.948590] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 2053.971624] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2053.972845] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 2054.095331] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:21:00 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 23)
05:21:00 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 14)
05:21:00 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5414, 0x0)
05:21:00 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff600000}, 0x58)
05:21:00 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x401000, 0x0, 0x0}, 0x58)
05:21:00 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xffffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:21:00 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 14)
05:21:00 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
ioctl$SG_IO(r0, 0x2285, &(0x7f0000000400)={0x53, 0xfffffffffffffffd, 0x1000, 0x80, @scatter={0x2, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/232, 0xe8}, {&(0x7f00000001c0)=""/203, 0xcb}]}, &(0x7f0000003b00)="dc7f1fa13b485b78b2175cd931f93af1abe54563da2bc85a13f277663c1d018f160c04438a23134274dabe4828802493625713755f8dcabf275329f5fae3c82fee79443b4b29117aea3dea2258ead2b33ed36e56147ba4207b1feea00052436cf8fde02b8970c78f65743ea6fdf6da16d9f98145efc117bc09ae8e1b44a06bbd6136b08cc11e0aa60d91e7ea1873f1c87ddebe64af07d1b2aed1bd6ae6445cc83e5b983b2898b71c2efbc10d80fb14cb76deaf85d20e9e0fc27a56982fe59d8bd441477dee76065ee9d0b32bc153efe996f81d9d540e9eea066bd84cbfece66331170985f8319e9f1566a5b84d6b9b29b418253ffcc15c5b5d930e6bc992662bc23b1c2063d9e9a3a75b19463a5ff8ae57429ab461edd90b62cb8179b961cbcb43001bcce97c6761b036b7ff7578566fdf8d0c177072be93fd33ea45055c06dd63a95bdf373bcddbc3e0d8aa141b315ca14b63d03cb1ee4477110de3cb4042dcf8094e19bde13925033e882f046e76c87e33013f1e6eeff77c954ead96547e95b8426771ccd6e3861f541c192e2db2e9ac76ea715c460361761b71f9ece2ae2e4b20c93bc528a813fe57a8b6a2796f7febd25406c2cd517faad0eee0e829fd65e00c8686ea83eaa3c6331536034a759fce940c1a26d3124b093a1d87455f296736e9480510d4495f008f82e9d3d5e4510b95916a8668c15f70c09cf64f3b7f04eab653b06af7cca194b09e9dd9d163a5cfd0c2393602d44c6b171129aae2a8535210bd7950c1487b6d780f5491be7ad91932533a52c7bce949bc76202177a816b65a176b5528a35de6382779c629c295b3a96d33b77da12fc40cf9a429f4b90ddbc0ed9e189829a05bd3ea3edc0632edc23d6d2845863c4d187ba4c44d05fd8dd583778b6231b164d13ade772dbae8e1edcbb7c7fe96950ad9484a17fcf75ca062f1b1359b6dc0ee9e613ecae3be96ec01ba76ddb76a492432edf8a809e5e5677dccfdde778a5cb7f3e876ebd6c340d65e625276480240f451544f5ad76f08d6d57e21cd38317a20ddf02436fb3627a645f54df70de187f830bef9682e2f9e22ada4d0b9033d84ef5a32cd1df16406f5e29a3b25bf08078f1bea49ce83775c38e7174db0b03c60bd1d1f42d37d99cb3e4c70ae1288eeab4ee745c5cf417822acf123b74c6cf066d24fee75c48bbca05d2fdc9a132cb18401f1f5a3f00c2d5584d0d0c9d00ca120498bde52330322a2115076754e8cf2a38b6bdd4da3a0a7d275eede0a56a5ace7ec84cf7a1a3da375dd1ae19ae7fd20c5ae98bc80e3d334984c8a48aaef03cc7258eab2f25f322d54fdecc6c1eee789b137ffab440a0a269b8ef64fd334bff1904c62bb1cfd177fad649b7e0b1b4c6681d94d41960c405559f819c6d31e4c2b885f496e6d7d878a58b44dc0f07d143b92f13b4fe91118a96472c60e311320b5f58550d9749be19daf8af501aa938755bd2fbf4912b547eec9e701682026a9a9abcdc331214c18f8172accf3317384c2886af73ba68732a60102279476bee7d24eacde692f98a525ca2e41828e3eb42d4fd792ece5c4ff0bc18b13828d050bf95318b18f927dc16fd22554930900d3e1ed8c619c07fc15ab76f5220ef0c50fd46e10047b31de621a81eba841195c1d619630a8faf09b91e6ba2c38314cf010a17eace6bf36460d95c94bf5f87c626da5fc3665e4561c53eb3b30bed965d986102a0d0be9ea21103c145dcc637818bafb3ea8c7077f6a03150c82e812096d4dfecb53132bb8c4c6283646c4d18ed2b4e13561a893856975e42abba5fef68bebd42a30527919cdcfaf96662d3dece87d69da287348827e80c7052d56f3e0211de40cb0183534e97987c5284a54df6828e99efd21128bf9bc21cfeca9edc16aa4fee3665a1c71a1be594c46f7758c83a06eca7f6ad8d15dc8444877d2113c917b391daa0a5f0ad7290600a3254fa84c0d12896f03fb5d16f51da7b93ca243b93c339e0baba36f8596e1e9c266d02079b3bb235556c94b735785c6730e5f8e854c8434e51f1dbe7c583243e909d24579a294a26fa18aaf427362199a1bbec888038def8714b817593ff6fd8ba63328f1cc2a9b96eb598d8ac9e2b2023bd6ba1dc5a2e8c3784221bd0e78f2276382fa078e13ac630f940e8cf85f74c18f6fc0919e273a20149bf3b797c9e2178167eddd159d0c29dc978323f36a3e8cb50071abd90db63ce4904599fd2e2ca0ab620e2d889fbd59f2ae42743ed280dfef1d722b93b049e76c8e90138314d61cad996ad5a537f01fb5442d8a4b22cc12552988ad3996f41a58df73b3fb78ce3e797ca4c4e63869ddf31c1551c6f2ee020c457551f6b9df4ca02448760f0c4774ad6e16c77cc59e9646522ba22b97e31157dc8e074b026701be8562f19921b308f69d9d43b29c5cc6d204e2be8719bd576c96d75073f5ac54fe340870b246876e2d25bf9c69f11a50231cb52d05b5eb1f9997f838c63a3aa0121d37efa54bce5a445432d77f5bd291be68deb2a3c8a42b59b0730aa80cbf932245db1c22c1ab69b90bd12d379a5da0046ab846a3d2f9a1f0e64173ed3fab1812c7b9946007c80aef2e192ca718b67e4364fa48ae0ab014b2b5d05c2b53f2d185ab72099d751844b07def270cc911f17bf1f805f8adcf7c1aa32556aacf674298ce11fd39e188f9504111061613bf6763db5df47a00a62531599dc2a8f3e9811228058fd98c1b3856ebae9d3a94b7005e2c1d0497def9f1626ed8bac65f2bf8b2b7f4e9fc77dedb86e45f2e761681d1d98fe32b35e2998519322e197dd0476626dcdc0bc587bde2a614e3e562fc64af4f5c4afd8d5900c41070dffcd008fcc5f493a14c0eef7851efba10acf3e98f906a5e908f746cbeddbad2d97f5cb341f1ae7de436e5e7b2adfd9e2a159f4b7b601ed1884e7e3c5cc7288293d5bb262171581cc4f73ca05ea0d419d70d9d89d69671a0518377120903e0a94cdfce8fdb2ec0642108c1a1321497adbd5e70d8b7026594376b681136a8b3710f8e4e47e9258d6ea890cfdbc451e308803af3b7f944da1cf20567776e3efac1edea14cd4fa3f8a9755b23a6a1528740862561664ddb30549d4461596b0a55c817414d847c238fee40a0196efaa68acd447ef1b67ee03de0413f0bc88a34050f9198c56a31dab04d42dfa403201201bdf71552e6ad3a833b2da3feb38aca281c66d99f414805d498d3590ad5cead3326385cc16e9e42181f35cce3f200cf2d7ec25cae5aeb4d16cc4f29b02874b47a58168c1cb97a13f6913b6b50a23e1e44d5ee9d0a4c9f7a9427423a9506aa8aece71efdc6d577458d0d4ac9ac28bff837cd519e47d82ae8b3a98ff7ce456d4e581381cb3aa0209a969e17c5d166cc8bc50ab8656b2f6cda4740b05a2d137bf0b3849f4629abe7ee9045b54c63c87cb537247b6e7a9ecf0c0b93b1520d2f825d6d14ed9402ca4b9307f2f22465d3bb5407589db2795437d287a35e3ab97a9d1b8745ef240a5f75f71488f4384ee8ea154ab023ee4e59f817af4edd7b2094c2da761615a8ac84d294b50e42bddf4a29516b9f7f9f083c67c06389ca072f19ebe0b6d6baa06e5742a731f19d6b3803c6301c0ce1febced6751f90c083244c2ce86b38dad38722f2cc5ddf9f8840c49ad8de7a872935c631fa0efd39d00f30e85e53327bb519a6ffcefd7df25d09395cbbbfacce4ef06c29b6bd92f5959b82479afb248794487d6699446443804638d2227203293de7e7c92cf177ad5fcac8313ca2aef1f57b0e7908baccf8f2f9689daa47247595a6d4b1c400b543cf1ecc16850ce0f3119f8513441ac5d17286517336207b9f3bb23def80cf728fbb3c698e85201c5b70d8a30569d66be0ec64cf022508c97d43e6bf4850266bd19c3131239cd1ecaeb16a6479ed334a25444f38fd3bd9c63002a75fc27ca3e2b696564809db092f2c5e1055518981500cd2c609a2341a9cd180824eb7ad2967192b6d933aa51fd618bd3b43bcea4313b4b14fbcff7d395452672a2a409dd131fd89d882c5caf4bdebec4790a9ea2dc1d769bb47dd9ae0199015b92e374d087ab392fa66243fee23328a55da405b48a0ffb3d4cb8f4a72d75a4289f73247f61966ee92dd7429c7f37beaf97f88f896053e6269feba258a0198c2aa3506224b2ee0a25354013c78c91452030e490aa4e551ee819acbaa01e20ad79f22239e8eb3c54e56ed2658b7689842e5c44788fab0feecc199324ad5cb92a223cf60a9edd17193bd9c7e0d5d52bddfde953e316471b097c8b90c871f1993966b47653a966e6f5617475ec40d189f803f5c18f2ebd304fcf391fd4a4092fa43e363d289f3b733a87a6fdb6ab8799f122679ae38f5a8aaae09ec349f4012050d92dad537df20eb76ca8bdaa6deaabedd2f67539bfec55ddb8e8b27ec74fcb7ec600e1ca012ca624a5b49f5d8f84bc3a70b2d58aa6c2241671336c925f0bc431e492c4f5ffc0924140001a3fa834daad1757cc380178591b7a33da652a45f1ca1b12b7997f5cfe54d93424d0d67f5c6a2699a03f3a04d7be9eba00fc0e9370804be2cc4f6ad9a8aed70d935b6ce8976435505bb6802c2341b77391fa86be096703aaee13900a810b9a4f2d5d4e9c7c10db0acc81b66e6d46afc4b46c521c2f864a480694ee6a840cf63ef4e1978123b331b7e8b700067d0f5a78a8d8f4f9c5451ce2eecd8757b8e415672272d669c03c2e6f8cda8f5e49398677c94e43425bd75d17ed9d494d734dbef3d89167bfed36f621cb80871f4752aafb7b7b47d0ebd662ce1e3f77ea55bb4139856310ba14ad841c1979df01f9d38540d8e0075d9cc45f5b2da7201754daf0a5ddbe90c19697e6206068263a0ca63c10f7eed5ed5b4c50bb61aa4c2151f7a3a68f8ab10903b64325b059759dd29908560dd3d26f81b7fd0a0e70c7e53d076400feffdf41bc16def0e780d979d5e6fb90023a89e18cbf04a874da18169a0d6e8fb62d79bd7db8fffc397774e3f0a7aa85f286fe6829a6b42c6cf134a578927bf0d87bf9e4614fb72ed9b0e244896d26a3f895ffb72f9da553f0d1a23c5a637d2ddd344e7e7df3a1605b7d79964584fda98ccfce8f94e37825792bb8a67785134e579f236e2059c0b0fa03e56557f0d94ebc4a8301f853eb6c7575e76e15a8c720e8bb4dd1c9eecb235d4dfca83a24f5610e2a6c3f5e52e3c145b8b5523c807a82f68467a04ebf2bfa3ebd01aac13579b4eed2c0b0116fc59373de5b35f2794efabb64d980da2d43c5f42196a2fe09df562457d97d87cab725f0b2861bc1784ea7b49d578eaaf16ad294b433ecfcaf3ad1935e0ba373a1a9a2e5e7416bbb16e615cfaa6f638fa317d0e176537131144148f5e0736b8798cab695b9d47237c9dccf56c8055ad3503f546ba6f50c64164d7cece70f6964ad32837e438a8af3617ab9fe657d961c64ed010a71fdc67d12d70e2763f257e6809e9073eb88fba1e0d42b06db6c4aa070ed45a7309a26ec264ac8bba9bc52f56ba1c644e86e69714d2ecd2f53cba7b52a0ad424757b657d6f206ff8ddb51316e5d1baf1e5a4b48c508c17d3e4942c7b8dc2709cd516ff8cc3f743d139c6c377acd61997880a75f87f2951455591ade707919014fafea2879d75ca750235c4573dfc61056c0ceb5d3f4364b93511ed2a0ce7d09fcfb37fef46b82788bbfaf452094c9779b5cb88c7ec541890231fa13a59c10a0b0c214d12f727de04a598cab0df5f797a2d97a568d5bbd0d3a6e97722cbbe7b100a56a60c401feaa22838", &(0x7f00000002c0)=""/208, 0x3, 0x10, 0xffffffffffffffff, &(0x7f00000003c0)})
ioctl$SG_IO(r0, 0x2285, &(0x7f0000000c00)={0x0, 0xfffffffffffffffb, 0xd7, 0x3f, @buffer={0x0, 0xbf, &(0x7f0000000980)=""/191}, &(0x7f0000000a40)="4dc5478f8f9259d00c525cb41800c15629dbcc2eb0ef07ff8eaba996fc97fb54196f9ab12bb87754a0124e04aed5ee0c8176433b098aa9db5c4c5533e49fd1167e28872c60ebcba388f0506897045b3f27157a527ba0fa3aa9e2611b57d2375935627f78e68c3227905c61837cec048345b9490eb561c86809657583424200a2c12f36f1ba9caab6ee893180675b1342499deafde93ecf8bc61aecf07932f4d879120cf5ab64a99a8b3a5c6b673face77650219cf6742a0d87c3420f2dfcef7a8886ee621e664dd20f113e569d1c7c723ab6cefbff9f79", &(0x7f0000000b40)=""/123, 0xf8, 0x4, 0x1, &(0x7f0000000bc0)})
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f0000000480)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0xd5, &(0x7f0000000500)=""/213}, &(0x7f0000001040)="000200000000", 0x0, 0x4, 0x0, 0x0, 0x0})
ioctl$SG_IO(r1, 0x2285, &(0x7f0000000900)={0x53, 0xfffffffffffffffb, 0xfe, 0x1, @buffer={0x0, 0xc9, &(0x7f0000000600)=""/201}, &(0x7f0000000700)="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", &(0x7f0000000800)=""/139, 0x2943, 0x22, 0x3, &(0x7f00000008c0)})
r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r3 = dup2(r2, r2)
r4 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r4, r3)
mkdirat(r3, &(0x7f0000000c80)='./file0\x00', 0x44)
memfd_secret(0x0)
[ 2064.181278] FAULT_INJECTION: forcing a failure.
[ 2064.181278] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 2064.182619] CPU: 0 UID: 0 PID: 38922 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2064.182638] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2064.182654] Call Trace:
[ 2064.182660]
[ 2064.182666] dump_stack_lvl+0xfa/0x120
[ 2064.182694] should_fail_ex+0x4d7/0x5e0
[ 2064.182721] should_fail_alloc_page+0xe0/0x110
[ 2064.182742] prepare_alloc_pages+0x1eb/0x550
[ 2064.182772] __alloc_frozen_pages_noprof+0x17f/0x1f10
[ 2064.182814] ? perf_trace_lock_acquire+0x3c9/0x710
[ 2064.182844] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10
[ 2064.182869] ? perf_trace_lock+0xbc/0x5f0
[ 2064.182899] ? __pfx_perf_trace_lock+0x10/0x10
[ 2064.182921] ? lock_is_held_type+0x9e/0x120
[ 2064.182944] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 2064.182969] ? policy_nodemask+0xeb/0x4e0
[ 2064.182996] alloc_pages_mpol+0xed/0x340
[ 2064.183017] ? __pfx_alloc_pages_mpol+0x10/0x10
[ 2064.183034] ? filemap_get_entry+0x1bb/0x3b0
[ 2064.183052] ? __pfx_filemap_get_entry+0x10/0x10
[ 2064.183085] folio_alloc_mpol_noprof+0x38/0xa0
[ 2064.183113] shmem_alloc_folio+0x11b/0x140
[ 2064.183145] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0
[ 2064.183183] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10
[ 2064.183208] ? __pfx_perf_trace_lock+0x10/0x10
[ 2064.183229] ? simple_xattr_get+0x173/0x1d0
[ 2064.183258] shmem_write_begin+0x194/0x3b0
[ 2064.183280] ? __pfx_shmem_write_begin+0x10/0x10
[ 2064.183293] ? timestamp_truncate+0x1eb/0x2f0
[ 2064.183311] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190
[ 2064.183330] ? __pfx_timestamp_truncate+0x10/0x10
[ 2064.183356] generic_perform_write+0x391/0x810
[ 2064.183399] ? __pfx_generic_perform_write+0x10/0x10
[ 2064.183427] ? inode_needs_update_time.part.0+0x170/0x270
[ 2064.183459] shmem_file_write_iter+0x111/0x140
[ 2064.183485] vfs_write+0xbe9/0x1150
[ 2064.183504] ? __pfx_shmem_file_write_iter+0x10/0x10
[ 2064.183526] ? __fget_files+0x34/0x3b0
[ 2064.183541] ? __pfx_vfs_write+0x10/0x10
[ 2064.183596] __x64_sys_pwrite64+0x1f1/0x260
[ 2064.183614] ? __pfx___x64_sys_pwrite64+0x10/0x10
[ 2064.183649] do_syscall_64+0xbf/0x430
[ 2064.183672] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2064.183687] RIP: 0033:0x7f92060edab7
[ 2064.183698] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b
[ 2064.183711] RSP: 002b:00007f92036aff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012
[ 2064.183725] RAX: ffffffffffffffda RBX: 00007f9206184970 RCX: 00007f92060edab7
[ 2064.183734] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000005
[ 2064.183742] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff
[ 2064.183751] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005
[ 2064.183758] R13: 0000000000000005 R14: 0000000020000200 R15: 0000000000000000
[ 2064.183796]
[ 2064.201178] FAULT_INJECTION: forcing a failure.
[ 2064.201178] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2064.205060] 9pnet_fd: p9_fd_create_tcp (38923): problem connecting socket to 127.0.0.1
[ 2064.205335] CPU: 1 UID: 0 PID: 38927 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2064.205368] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2064.205383] Call Trace:
[ 2064.205391]
[ 2064.205400] dump_stack_lvl+0xfa/0x120
[ 2064.205437] should_fail_ex+0x4d7/0x5e0
[ 2064.205470] strncpy_from_user+0x3b/0x2f0
[ 2064.205509] getname_flags.part.0+0x8d/0x540
[ 2064.205547] getname_flags+0x95/0xe0
[ 2064.205571] do_sys_openat2+0x9f/0x1b0
[ 2064.205607] ? __pfx_do_sys_openat2+0x10/0x10
[ 2064.205644] ? __pfx_perf_trace_lock+0x10/0x10
[ 2064.205681] ? __might_fault+0x138/0x190
[ 2064.205721] __x64_sys_openat+0x142/0x200
[ 2064.205753] ? __pfx___x64_sys_openat+0x10/0x10
[ 2064.205788] ? lock_release+0xc8/0x290
[ 2064.205832] do_syscall_64+0xbf/0x430
[ 2064.205863] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2064.205886] RIP: 0033:0x7f410719fa04
[ 2064.205905] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 2064.205927] RSP: 002b:00007f4104761ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 2064.205949] RAX: ffffffffffffffda RBX: 00007f4107236970 RCX: 00007f410719fa04
[ 2064.205965] RDX: 0000000000000002 RSI: 00007f4104762000 RDI: 00000000ffffff9c
[ 2064.205979] RBP: 00007f4104762000 R08: 0000000000000000 R09: ffffffffffffffff
[ 2064.205994] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 2064.206008] R13: 0000000000000005 R14: 0000000020000308 R15: 000000000000000b
[ 2064.206043]
[ 2064.239319] loop3: detected capacity change from 0 to 512
[ 2064.254151] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
05:21:00 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1000000, 0x0, 0x0}, 0x58)
05:21:00 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 15)
05:21:00 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 15)
05:21:00 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5415, 0x0)
[ 2064.350469] FAULT_INJECTION: forcing a failure.
[ 2064.350469] name failslab, interval 1, probability 0, space 0, times 0
[ 2064.351709] CPU: 0 UID: 0 PID: 38977 Comm: syz-executor.7 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2064.351728] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2064.351738] Call Trace:
[ 2064.351743]
[ 2064.351749] dump_stack_lvl+0xfa/0x120
[ 2064.351777] should_fail_ex+0x4d7/0x5e0
[ 2064.351804] should_failslab+0xc2/0x120
[ 2064.351822] ? __pfx_v9fs_init_fs_context+0x10/0x10
[ 2064.351844] __kmalloc_cache_noprof+0x81/0x6b0
[ 2064.351868] ? trace_kmalloc+0x1f/0xb0
[ 2064.351881] ? v9fs_init_fs_context+0x49/0x5b0
[ 2064.351901] ? lockdep_init_map_type+0x4b/0x240
[ 2064.351923] ? __pfx_v9fs_init_fs_context+0x10/0x10
[ 2064.351948] ? v9fs_init_fs_context+0x49/0x5b0
[ 2064.351969] v9fs_init_fs_context+0x49/0x5b0
[ 2064.351989] ? __pfx_v9fs_init_fs_context+0x10/0x10
[ 2064.352010] alloc_fs_context+0x580/0xb20
[ 2064.352038] path_mount+0xd8d/0x2140
[ 2064.352058] ? trace_irq_enable.constprop.0+0xc2/0x100
[ 2064.352084] ? __pfx_path_mount+0x10/0x10
[ 2064.352102] ? kmem_cache_free+0x26f/0x500
[ 2064.352124] ? putname.part.0+0xc0/0x160
[ 2064.352144] ? getname_flags.part.0+0x1c6/0x540
[ 2064.352171] ? putname.part.0+0xc0/0x160
[ 2064.352198] __x64_sys_mount+0x293/0x310
[ 2064.352216] ? __pfx___x64_sys_mount+0x10/0x10
[ 2064.352250] do_syscall_64+0xbf/0x430
[ 2064.352273] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2064.352288] RIP: 0033:0x7f47720dbb19
[ 2064.352299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2064.352313] RSP: 002b:00007f476f651188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 2064.352326] RAX: ffffffffffffffda RBX: 00007f47721eef60 RCX: 00007f47720dbb19
[ 2064.352336] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000
[ 2064.352344] RBP: 00007f476f6511d0 R08: 0000000020000540 R09: 0000000000000000
[ 2064.352353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2064.352361] R13: 00007fff368ec4df R14: 00007f476f651300 R15: 0000000000022000
[ 2064.352399]
05:21:00 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 24)
05:21:00 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffefff1f}, 0x58)
05:21:00 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r2, r1)
r3 = socket$inet(0x2, 0xa, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x5411, &(0x7f0000000040)={'lo\x00'})
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000002200)={0xa7, 0x4, 0x4c07})
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000001080)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'})
ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001000)={0xffffffffffffffff, 0xffff, 0x2, 0x8})
perf_event_open(&(0x7f0000002180)={0x3, 0x80, 0x9, 0x5, 0x81, 0x1f, 0x0, 0x455a, 0x400, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6e2, 0x1}, 0x2, 0x8000, 0x8, 0x9, 0x401, 0xa4, 0x400, 0x0, 0x10001, 0x0, 0x8}, 0xffffffffffffffff, 0x5, r4, 0x3)
r5 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
r6 = dup(r5)
ioctl$SG_IO(r6, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
[ 2064.432847] FAULT_INJECTION: forcing a failure.
[ 2064.432847] name failslab, interval 1, probability 0, space 0, times 0
[ 2064.433810] CPU: 0 UID: 0 PID: 39031 Comm: syz-executor.5 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2064.433829] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2064.433838] Call Trace:
[ 2064.433843]
[ 2064.433849] dump_stack_lvl+0xfa/0x120
[ 2064.433876] should_fail_ex+0x4d7/0x5e0
[ 2064.433900] ? alloc_empty_file+0x58/0x1e0
[ 2064.433918] should_failslab+0xc2/0x120
[ 2064.433937] kmem_cache_alloc_noprof+0x80/0x690
[ 2064.433976] ? alloc_empty_file+0x58/0x1e0
[ 2064.433995] alloc_empty_file+0x58/0x1e0
[ 2064.434035] path_openat+0xe0/0x2880
[ 2064.434059] ? perf_trace_run_bpf_submit+0xef/0x180
[ 2064.434096] ? perf_trace_run_bpf_submit+0xef/0x180
[ 2064.434127] ? __pfx_path_openat+0x10/0x10
[ 2064.434141] ? perf_trace_lock_acquire+0x3c9/0x710
[ 2064.434169] ? __pfx_perf_trace_lock+0x10/0x10
[ 2064.434207] do_filp_open+0x1e8/0x450
[ 2064.434222] ? __pfx_do_filp_open+0x10/0x10
[ 2064.434258] ? find_held_lock+0x2b/0x80
[ 2064.434275] ? alloc_fd+0x2c1/0x560
[ 2064.434290] ? lock_release+0xc8/0x290
[ 2064.434320] ? _raw_spin_unlock+0x1e/0x40
[ 2064.434345] ? alloc_fd+0x2c1/0x560
[ 2064.434377] do_sys_openat2+0x104/0x1b0
[ 2064.434402] ? __pfx_do_sys_openat2+0x10/0x10
[ 2064.434430] ? __pfx_perf_trace_lock+0x10/0x10
[ 2064.434452] ? __might_fault+0x138/0x190
[ 2064.434482] __x64_sys_openat+0x142/0x200
[ 2064.434502] ? __pfx___x64_sys_openat+0x10/0x10
[ 2064.434528] ? lock_release+0xc8/0x290
[ 2064.434564] do_syscall_64+0xbf/0x430
[ 2064.434586] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2064.434601] RIP: 0033:0x7f410719fa04
[ 2064.434613] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 2064.434626] RSP: 002b:00007f4104761ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 2064.434639] RAX: ffffffffffffffda RBX: 00007f4107236970 RCX: 00007f410719fa04
[ 2064.434661] RDX: 0000000000000002 RSI: 00007f4104762000 RDI: 00000000ffffff9c
[ 2064.434669] RBP: 00007f4104762000 R08: 0000000000000000 R09: ffffffffffffffff
[ 2064.434678] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 2064.434686] R13: 0000000000000005 R14: 0000000020000308 R15: 000000000000000b
[ 2064.434723]
[ 2064.444655] FAULT_INJECTION: forcing a failure.
[ 2064.444655] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2064.459225] CPU: 1 UID: 0 PID: 39033 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2064.459258] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2064.459275] Call Trace:
[ 2064.459283]
[ 2064.459293] dump_stack_lvl+0xfa/0x120
[ 2064.459331] should_fail_ex+0x4d7/0x5e0
[ 2064.459357] ? page_copy_sane+0xce/0x2b0
[ 2064.459384] copy_folio_from_iter_atomic+0x3d3/0x18c0
[ 2064.459426] ? simple_xattr_get+0x173/0x1d0
[ 2064.459461] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10
[ 2064.459489] ? shmem_write_begin+0x1ab/0x3b0
[ 2064.459519] ? __pfx_shmem_write_begin+0x10/0x10
[ 2064.459542] ? timestamp_truncate+0x1eb/0x2f0
[ 2064.459570] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190
[ 2064.459601] ? __pfx_timestamp_truncate+0x10/0x10
[ 2064.459634] generic_perform_write+0x1d7/0x810
[ 2064.459685] ? __pfx_generic_perform_write+0x10/0x10
[ 2064.459724] ? inode_needs_update_time.part.0+0x170/0x270
[ 2064.459762] shmem_file_write_iter+0x111/0x140
[ 2064.459800] vfs_write+0xbe9/0x1150
[ 2064.459826] ? __pfx_shmem_file_write_iter+0x10/0x10
[ 2064.459862] ? __fget_files+0x34/0x3b0
[ 2064.459885] ? __pfx_vfs_write+0x10/0x10
[ 2064.459937] __x64_sys_pwrite64+0x1f1/0x260
[ 2064.459964] ? __pfx___x64_sys_pwrite64+0x10/0x10
[ 2064.460003] do_syscall_64+0xbf/0x430
[ 2064.460035] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2064.460058] RIP: 0033:0x7f92060edab7
[ 2064.460084] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b
[ 2064.460106] RSP: 002b:00007f92036aff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012
[ 2064.460130] RAX: ffffffffffffffda RBX: 00007f9206184970 RCX: 00007f92060edab7
[ 2064.460146] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000005
[ 2064.460160] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff
[ 2064.460175] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005
[ 2064.460189] R13: 0000000000000005 R14: 0000000020000200 R15: 0000000000000000
[ 2064.460226]
[ 2064.461020] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2064.477575] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 2064.490022] sd 0:0:0:0: [sg_rq_end_io] Sense Key : Illegal Request [current]
[ 2064.490701] sd 0:0:0:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
[ 2064.494124] loop3: detected capacity change from 0 to 512
05:21:00 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5416, 0x0)
05:21:00 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x5418, 0x0)
05:21:00 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
[ 2064.596802] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 2064.777521] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
05:21:12 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44050}, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0, 0x0, 0x3400}, {0x0}, {0x0, 0x0, 0x3de0}, {&(0x7f0000011d00), 0x0, 0x4000}, {0x0, 0x0, 0x41c0}, {&(0x7f0000012000)}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 25)
05:21:12 executing program 6:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
dup2(r1, r1)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
05:21:12 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x541b, 0x0)
05:21:12 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x401, 0x0)
ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
r1 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0)
dup(r1)
05:21:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfffff000}, 0x58)
05:21:12 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 16)
05:21:12 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2200}, {0x0}], 0x0, &(0x7f0000012c00)) (fail_nth: 16)
05:21:12 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0x10000)
clone3(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000000, 0x0, 0x0}, 0x58)
[ 2076.296916] loop5: detected capacity change from 0 to 512
[ 2076.324498] 9pnet_fd: p9_fd_create_tcp (39279): problem connecting socket to 127.0.0.1
[ 2076.338646] FAULT_INJECTION: forcing a failure.
[ 2076.338646] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2076.341015] CPU: 0 UID: 0 PID: 39287 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2076.341060] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2076.341086] Call Trace:
[ 2076.341096]
[ 2076.341106] dump_stack_lvl+0xfa/0x120
[ 2076.341147] should_fail_ex+0x4d7/0x5e0
[ 2076.341171] ? page_copy_sane+0xce/0x2b0
[ 2076.341207] copy_folio_from_iter_atomic+0x3d3/0x18c0
[ 2076.341275] ? __lock_acquire+0xc65/0x1b70
[ 2076.341319] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10
[ 2076.341350] ? shmem_write_begin+0x1ab/0x3b0
[ 2076.341383] ? __pfx_shmem_write_begin+0x10/0x10
[ 2076.341417] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190
[ 2076.341450] ? __mark_inode_dirty+0xecf/0x1470
[ 2076.341497] generic_perform_write+0x1d7/0x810
[ 2076.341573] ? __pfx_generic_perform_write+0x10/0x10
[ 2076.341628] ? generic_update_time+0xcb/0xf0
[ 2076.341656] ? mnt_put_write_access_file+0xb7/0xe0
[ 2076.341708] shmem_file_write_iter+0x111/0x140
[ 2076.341753] vfs_write+0xbe9/0x1150
[ 2076.341785] ? __pfx_shmem_file_write_iter+0x10/0x10
[ 2076.341822] ? __fget_files+0x34/0x3b0
[ 2076.341846] ? __pfx_vfs_write+0x10/0x10
[ 2076.341944] __x64_sys_pwrite64+0x1f1/0x260
[ 2076.341975] ? __pfx___x64_sys_pwrite64+0x10/0x10
[ 2076.342053] do_syscall_64+0xbf/0x430
[ 2076.342095] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2076.342118] RIP: 0033:0x7f92060edab7
[ 2076.342138] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b
[ 2076.342159] RSP: 002b:00007f92036aff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012
[ 2076.342181] RAX: ffffffffffffffda RBX: 00007f9206184970 RCX: 00007f92060edab7
[ 2076.342197] RDX: 0000000000000020 RSI: 0000000020010300 RDI: 0000000000000005
[ 2076.342211] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff
[ 2076.342225] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000005
[ 2076.342239] R13: 0000000000000005 R14: 0000000020000218 R15: 0000000000000001
[ 2076.342306]
05:21:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffe4}, 0x58)
05:21:12 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$TCSBRKP(r0, 0x541d, 0x0)
[ 2076.400473] loop3: detected capacity change from 0 to 512
05:21:12 executing program 4:
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001140)=""/4112, 0x1010}], 0x1}, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000001000), 0x1, 0x30000)
r1 = dup(r0)
ioctl$SG_IO(r1, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x9, 0x1002, &(0x7f0000000000)=""/4096}, &(0x7f0000001040)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$SG_IO(r1, 0x2285, &(0x7f0000002240)={0x53, 0xfffffffffffffffd, 0xa, 0x2, @buffer={0x0, 0x17, &(0x7f0000001080)=""/23}, &(0x7f0000002180)="582e3e94134a7ac79cd5", &(0x7f00000021c0)=""/23, 0x80, 0x10000, 0x3, &(0x7f0000002200)})
[ 2076.456446] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 2076.530755] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
05:21:12 executing program 7:
creat(&(0x7f00000003c0)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)={'trans=tcp,', {}, 0x2c, {[{@privport}, {@afid}], [{@fowner_eq}]}}) (fail_nth: 17)
05:21:12 executing program 0:
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000040)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x58)
[ 2076.656466] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 2076.696953] FAULT_INJECTION: forcing a failure.
[ 2076.696953] name failslab, interval 1, probability 0, space 0, times 0
[ 2076.698760] CPU: 0 UID: 0 PID: 39439 Comm: syz-executor.7 Not tainted 6.18.0-rc5-next-20251114 #1 PREEMPT(voluntary)
[ 2076.698792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2076.698820] Call Trace:
[ 2076.698829]
[ 2076.698841] dump_stack_lvl+0xfa/0x120
[ 2076.698881] should_fail_ex+0x4d7/0x5e0
[ 2076.698925] should_failslab+0xc2/0x120
[ 2076.698956] __kmalloc_node_track_caller_noprof+0xcf/0x770
[ 2076.698993] ? trace_kmalloc+0x1f/0xb0
[ 2076.699014] ? __kmalloc_cache_noprof+0x27b/0x6b0
[ 2076.699047] ? v9fs_init_fs_context+0xf3/0x5b0
[ 2076.699110] ? kstrdup+0x3e/0xc0
[ 2076.699133] kstrdup+0x3e/0xc0
[ 2076.699163] v9fs_init_fs_context+0xf3/0x5b0
[ 2076.699197] ? __pfx_v9fs_init_fs_context+0x10/0x10
[ 2076.699233] alloc_fs_context+0x580/0xb20
[ 2076.699279] path_mount+0xd8d/0x2140
[ 2076.699312] ? trace_irq_enable.constprop.0+0xc2/0x100
[ 2076.699347] ? __pfx_path_mount+0x10/0x10
[ 2076.699377] ? kmem_cache_free+0x26f/0x500
[ 2076.699412] ? putname.part.0+0xc0/0x160
[ 2076.699446] ? getname_flags.part.0+0x1c6/0x540
[ 2076.699489] ? putname.part.0+0xc0/0x160
[ 2076.699536] __x64_sys_mount+0x293/0x310
[ 2076.699567] ? __pfx___x64_sys_mount+0x10/0x10
[ 2076.699626] do_syscall_64+0xbf/0x430
[ 2076.699663] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 2076.699687] RIP: 0033:0x7f47720dbb19
[ 2076.699706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2076.699728] RSP: 002b:00007f476f651188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 2076.699750] RAX: ffffffffffffffda RBX: 00007f47721eef60 RCX: 00007f47720dbb19
[ 2076.699765] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000
[ 2076.699780] RBP: 00007f476f6511d0 R08: 0000000020000540 R09: 0000000000000000
[ 2076.699798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2076.699817] R13: 00007fff368ec4df R14: 00007f476f651300 R15: 0000000000022000
[ 2076.699908]
[ 2076.701116] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 2086.686816] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff88800b8aca00 (size 128):
comm "syz-executor.7", pid 39439, jiffies 4296743492
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace (crc 96bdc52d):
__kmalloc_cache_noprof+0x445/0x6b0
v9fs_init_fs_context+0x49/0x5b0
alloc_fs_context+0x580/0xb20
path_mount+0xd8d/0x2140
__x64_sys_mount+0x293/0x310
do_syscall_64+0xbf/0x430
entry_SYSCALL_64_after_hwframe+0x77/0x7f
BUG: leak checking failed
VM DIAGNOSIS:
05:21:28 Registers:
info registers vcpu 0
RAX=0000000000614e0f RBX=0000000000000000 RCX=ffffffff84c7add7 RDX=0000000000000000
RSI=0000000000000000 RDI=ffffffff814d3ad0 RBP=dffffc0000000000 RSP=ffffffff85c07e00
R8 =0000000000000001 R9 =ffffed100d9c639a R10=ffff88806ce31cd3 R11=0000000000000001
R12=ffffffff8664ed50 R13=1ffffffff0b80fc7 R14=0000000000000000 R15=0000000000000000
RIP=ffffffff84c797ce RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000000000000000 00000000 00000000
GS =0000 ffff8880e538f000 00000000 00000000
LDT=0000 fffffe3d00000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007fffc8aa20e0 CR3=000000000e3a0000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000600
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000
XMM02=0000000000000000418bc657c0000000 XMM03=0000ff00000000000000000000000000
XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962
XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72
XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000
XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000
info registers vcpu 1
RAX=0000000000af0791 RBX=0000000000000001 RCX=ffffffff84c7add7 RDX=0000000000000000
RSI=0000000000000000 RDI=ffffffff814d3ad0 RBP=dffffc0000000000 RSP=ffff8880096efe58
R8 =0000000000000001 R9 =ffffed100d9e639a R10=ffff88806cf31cd3 R11=0000000000000001
R12=ffffffff8664ed50 R13=1ffff110012ddfd2 R14=0000000000000000 R15=0000000000000000
RIP=ffffffff84c797ce RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000000000000000 00000000 00000000
GS =0000 ffff8880e548f000 00000000 00000000
LDT=0000 fffffe4f00000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007fd5611ac518 CR3=000000000e3a0000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000000000000000000000000000 XMM01=00000009000000070000000400000003
XMM02=00000006000000000000000000000000 XMM03=0000001c0000001c0000001c00000015
XMM04=7566206365786509126c61746f742063 XMM05=616469646e616320636578650e007a7a
XMM06=7a696d696e696d20636578650d006574 XMM07=650a086873616d7320636578650a0065
XMM08=7a7566206365786509126c61746f7420 XMM09=74616469646e616320636578650e007a
XMM10=657a696d696e696d20636578650d0065 XMM11=78650a086873616d7320636578650a00
XMM12=747563657865110a73746e6968206365 XMM13=6578650800737472617473657220726f
XMM14=6169727420636578650b006e65672063 XMM15=0000736465657320636578650a006567