op4: detected capacity change from 0 to 11 [ 235.689473][T23888] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 235.703007][ C1] sd 0:0:1:0: [sg0] tag#8069 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 235.713725][ C1] sd 0:0:1:0: [sg0] tag#8069 CDB: opcode=0xe5 (vendor) [ 235.713749][ C1] sd 0:0:1:0: [sg0] tag#8069 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:33:33 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7268160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 235.713770][ C1] sd 0:0:1:0: [sg0] tag#8069 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 235.713791][ C1] sd 0:0:1:0: [sg0] tag#8069 CDB[20]: ba [ 235.768621][T23896] loop4: detected capacity change from 0 to 11 [ 235.769357][T23896] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x18f000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:33 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 235.853905][T23905] loop4: detected capacity change from 0 to 11 [ 235.860629][T23905] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 235.901732][T23914] loop4: detected capacity change from 0 to 11 [ 235.902220][T23914] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 235.917621][ C0] sd 0:0:1:0: [sg0] tag#8070 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 235.917644][ C0] sd 0:0:1:0: [sg0] tag#8070 CDB: opcode=0xe5 (vendor) [ 235.917665][ C0] sd 0:0:1:0: [sg0] tag#8070 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 235.917684][ C0] sd 0:0:1:0: [sg0] tag#8070 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 235.917699][ C0] sd 0:0:1:0: [sg0] tag#8070 CDB[20]: ba 00:33:33 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x0, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:33 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7269160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x190000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 236.167203][T23927] loop4: detected capacity change from 0 to 11 [ 236.168780][T23927] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 236.185058][ C1] sd 0:0:1:0: [sg0] tag#8071 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 236.185083][ C1] sd 0:0:1:0: [sg0] tag#8071 CDB: opcode=0xe5 (vendor) [ 236.185099][ C1] sd 0:0:1:0: [sg0] tag#8071 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 236.185145][ C1] sd 0:0:1:0: [sg0] tag#8071 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 236.185160][ C1] sd 0:0:1:0: [sg0] tag#8071 CDB[20]: ba [ 236.236734][T23932] loop4: detected capacity change from 0 to 11 [ 236.254521][T23932] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:34 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb726c160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f00000004c0)={{0x0, 0x10000, 0x1, 0x1, 0xfffffffffffffeff, 0x1, 0x9, 0x20, 0x3, 0x9, 0xffff46ae, 0x2, 0x6, 0x33c}}) fcntl$setstatus(r1, 0x4, 0xc0000) openat$procfs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000080004105) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0xa, 0x4, 0x87, &(0x7f00000000c0)="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"}) 00:33:34 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x191000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 236.507234][T23950] loop4: detected capacity change from 0 to 11 [ 236.521587][T23950] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 236.551282][T23959] loop4: detected capacity change from 0 to 11 [ 236.557805][T23959] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:34 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:34 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb726f160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:34 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x192000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:34 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 236.838915][T23977] loop4: detected capacity change from 0 to 11 [ 236.848379][ C0] sd 0:0:1:0: [sg0] tag#8072 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 236.848413][ C0] sd 0:0:1:0: [sg0] tag#8072 CDB: opcode=0xe5 (vendor) [ 236.848429][ C0] sd 0:0:1:0: [sg0] tag#8072 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 236.848451][ C0] sd 0:0:1:0: [sg0] tag#8072 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 236.848473][ C0] sd 0:0:1:0: [sg0] tag#8072 CDB[20]: ba [ 236.866962][ C0] sd 0:0:1:0: [sg0] tag#8073 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 236.901299][ C0] sd 0:0:1:0: [sg0] tag#8073 CDB: opcode=0xe5 (vendor) [ 236.901318][ C0] sd 0:0:1:0: [sg0] tag#8073 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 236.901334][ C0] sd 0:0:1:0: [sg0] tag#8073 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 236.901350][ C0] sd 0:0:1:0: [sg0] tag#8073 CDB[20]: ba 00:33:34 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7273160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 236.938966][T23986] loop4: detected capacity change from 0 to 11 00:33:34 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x193000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 237.027621][T23994] loop4: detected capacity change from 0 to 11 [ 237.092828][T24002] loop4: detected capacity change from 0 to 11 00:33:35 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x0, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:35 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7274160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x194000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 237.292325][T24017] loop4: detected capacity change from 0 to 11 00:33:35 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7275160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 237.334465][T24025] loop4: detected capacity change from 0 to 11 [ 237.407554][T24032] loop4: detected capacity change from 0 to 11 [ 237.452438][T24038] loop4: detected capacity change from 0 to 11 00:33:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSIG(r0, 0x40045436, 0x22) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r0, 0x0, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000001280)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="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") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r3, 0x407, 0x7000000) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000001240)) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) fsetxattr$security_capability(r2, &(0x7f0000000000), &(0x7f0000000040)=@v2={0x2000000, [{0x0, 0x6}, {0x7, 0x4}]}, 0x14, 0x3) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x49) preadv(r0, &(0x7f0000001200)=[{&(0x7f0000001140)=""/47, 0x2f}, {&(0x7f0000001180)=""/75, 0x4b}], 0x2, 0x3f, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r4, 0x541c, &(0x7f0000000100)) 00:33:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x195000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:35 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x0, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:35 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7278160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fcntl$setstatus(r1, 0x4, 0xc0000) io_setup(0x3, &(0x7f0000000000)=0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f00000002c0)={{0x87, @empty, 0x4e20, 0x0, 'lblc\x00', 0x0, 0x6, 0x63}, {@private=0xa010102, 0x4e22, 0x2, 0x9, 0x1f, 0x3}}, 0x44) fcntl$setpipe(r6, 0x407, 0x7000000) fcntl$setpipe(r5, 0x407, 0x229) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r7, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r7, 0x407, 0x7000000) io_submit(r2, 0x4, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r3, &(0x7f0000000040)="76f75405339bcd00a21eee", 0xb, 0xff, 0x0, 0x2, r1}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x6, r4, &(0x7f0000000100)="554ce15d8b8a321c6831541a7695e1b64093a651a72b86b1ffb8698a5edfa375e84a97d12eadbfed0066dad75860ac7303", 0x31, 0xffffffffffffff88, 0x0, 0x5, r1}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x3ff, r1, &(0x7f0000000180)="dddcefa62fcac1e3aa896e2806b42596d39c3164a3334964a56e9e", 0x1b, 0x3, 0x0, 0x0, r6}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x4bb5, r0, &(0x7f0000000200)="a470fd506cc2486682774c0e9d3f65", 0xf, 0x6, 0x0, 0x0, r7}]) sendfile(r0, r1, 0x0, 0x800000080004105) [ 237.722631][T24059] loop4: detected capacity change from 0 to 11 [ 237.782777][T24068] loop4: detected capacity change from 0 to 11 00:33:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x196000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:35 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:35 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb727a160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 238.008624][T24085] loop4: detected capacity change from 0 to 11 [ 238.061284][T24092] loop4: detected capacity change from 0 to 11 00:33:36 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x0, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:36 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb72702e0b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:36 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x197000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 238.323993][T24107] loop4: detected capacity change from 0 to 11 00:33:36 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb727016056413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 238.376309][T24110] loop4: detected capacity change from 0 to 11 00:33:36 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x198000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 238.441815][T24116] loop4: detected capacity change from 0 to 11 00:33:36 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270162e6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 238.486020][T24120] loop4: detected capacity change from 0 to 11 [ 238.557377][T24131] loop4: detected capacity change from 0 to 11 [ 238.602180][T24136] loop4: detected capacity change from 0 to 11 00:33:36 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:36 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b2513a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r7, 0x4, 0xc0000) sendfile(r1, r7, 0x0, 0x800000080004105) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x30f41, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r8, 0x7, 0x0, 0x0, 0x0) 00:33:36 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x199000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 238.818996][T24157] loop4: detected capacity change from 0 to 11 [ 238.866299][T24161] loop4: detected capacity change from 0 to 11 00:33:36 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b642ea4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:36 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 239.086337][T24178] loop4: detected capacity change from 0 to 11 [ 239.094978][ C1] scsi_io_completion_action: 5 callbacks suppressed [ 239.095023][ C1] sd 0:0:1:0: [sg0] tag#8079 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 239.111968][ C1] sd 0:0:1:0: [sg0] tag#8079 CDB: opcode=0xe5 (vendor) [ 239.111988][ C1] sd 0:0:1:0: [sg0] tag#8079 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 239.112004][ C1] sd 0:0:1:0: [sg0] tag#8079 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 239.112038][ C1] sd 0:0:1:0: [sg0] tag#8079 CDB[20]: ba [ 239.173480][T24183] loop4: detected capacity change from 0 to 11 00:33:37 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x0, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:37 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x19a000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff2292c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff2c92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 239.394893][ C0] sd 0:0:1:0: [sg0] tag#8080 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 239.405279][ C0] sd 0:0:1:0: [sg0] tag#8080 CDB: opcode=0xe5 (vendor) [ 239.406845][T24197] loop4: detected capacity change from 0 to 11 [ 239.412155][ C0] sd 0:0:1:0: [sg0] tag#8080 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 239.427876][ C0] sd 0:0:1:0: [sg0] tag#8080 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 239.427898][ C0] sd 0:0:1:0: [sg0] tag#8080 CDB[20]: ba [ 239.485980][T24203] loop4: detected capacity change from 0 to 11 00:33:37 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x19b000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c041ec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 239.556248][T24208] loop4: detected capacity change from 0 to 11 [ 239.666567][T24219] loop4: detected capacity change from 0 to 11 [ 239.732761][T24229] loop4: detected capacity change from 0 to 11 00:33:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r7, 0x4, 0xc0000) sendfile(r1, r7, 0x0, 0x800000080004105) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x30f41, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r8, 0x7, 0x0, 0x0, 0x0) 00:33:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/sockcreate\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendfile(r0, r2, 0x0, 0x20) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x604202, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) 00:33:37 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x19c000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec25b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fcntl$setstatus(r1, 0x4, 0xc0000) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000040)={0x7fff, 0xcbba, 0x2, 0xfffc}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$sock_ifreq(r4, 0x8993, &(0x7f0000000140)={'bridge0\x00', @ifru_data=&(0x7f0000000100)="a84a977bbe656a66637515bf0be39d4945bfc06476e8b98912962472b482c44f"}) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ftruncate(r3, 0x8) socket(0x28, 0x0, 0x77b) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004105) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) [ 239.873617][T24242] loop4: detected capacity change from 0 to 11 [ 239.941658][T24256] loop4: detected capacity change from 0 to 11 00:33:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec2eb2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 240.178922][T24270] loop4: detected capacity change from 0 to 11 [ 240.214382][T24274] loop4: detected capacity change from 0 to 11 00:33:38 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x0, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:38 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x19d000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:38 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:38 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960254a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='children\x00') writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2498e130b11e4e6100574f270f0a04d5257a79e436254462ab2d611eb5b9ea9d5ee2e4cbfd19dc0e6305826dec54c74713f2c43a7ef45d1b7fb76a2995c3e9280d43cb2b23baee81e9ac6e83e1617843f002ac6bebef6ade286253acb00bf92d76aa70948bf225046fe5d8bb86421824e0eeced4b8a8044a63cece0092f194582df6a030dea6125ee5b7ecd8b534a24f31e71ddcf51f9f115245a0ed97e0ce643b1806c91330a202f7", 0xa9}, {&(0x7f0000000180)="24ac21291f3d4a29dac8b4233b6b4c0a1a49381c8ab45410fc7ee9bdf6f047ed239f9873204a2b9143c7517c0017f266e347dbbd61fae5abf8dedc284904cb3b44059591d317de14708b9402c5e3b826cd18c55095192ecf80fa2b4eaf9ff4e53664954cb35918ecfdedd8132fea3e0339797938cbb691906638104d34c7acd4ece1d438310d2f8860c968652789f12ff9f522742d6ff6c64abc943065999f431449262c019c0458cda8c8571b2be2e220fb0c63617c31febc2efaf47fd604b109ff1ee6c71ea49cc6374b0ed57b486e0a39ed0ec240e1e628176d406f27d805b609", 0xe2}], 0x2) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) fcntl$setstatus(r1, 0x4, 0x6000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 240.447479][ C0] sd 0:0:1:0: [sg0] tag#8081 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 240.457961][ C0] sd 0:0:1:0: [sg0] tag#8081 CDB: opcode=0xe5 (vendor) [ 240.464816][ C0] sd 0:0:1:0: [sg0] tag#8081 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 240.473923][ C1] sd 0:0:1:0: [sg0] tag#8082 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 240.474574][ C0] sd 0:0:1:0: [sg0] tag#8081 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 00:33:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r7, 0x4, 0xc0000) sendfile(r1, r7, 0x0, 0x800000080004105) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x30f41, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r8, 0x7, 0x0, 0x0, 0x0) [ 240.484879][ C1] sd 0:0:1:0: [sg0] tag#8082 CDB: opcode=0xe5 (vendor) [ 240.494420][ C0] sd 0:0:1:0: [sg0] tag#8081 CDB[20]: ba [ 240.501271][ C1] sd 0:0:1:0: [sg0] tag#8082 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 240.516449][ C1] sd 0:0:1:0: [sg0] tag#8082 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 240.516469][ C1] sd 0:0:1:0: [sg0] tag#8082 CDB[20]: ba [ 240.539101][T24288] loop4: detected capacity change from 0 to 11 [ 240.539564][T24288] EXT4-fs: 31 callbacks suppressed [ 240.539574][T24288] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 240.576260][T24303] loop4: detected capacity change from 0 to 11 [ 240.577713][T24303] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:38 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960354a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x1) 00:33:38 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x19e000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 240.696080][T24315] loop4: detected capacity change from 0 to 11 [ 240.720742][T24315] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 240.763425][T24327] loop4: detected capacity change from 0 to 11 [ 240.763611][T24327] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:38 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960554a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:38 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x19f000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 240.865446][T24336] loop4: detected capacity change from 0 to 11 [ 240.867086][T24336] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:38 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960654a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 240.925609][T24340] loop4: detected capacity change from 0 to 11 [ 240.925933][T24340] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 241.009187][T24351] loop4: detected capacity change from 0 to 11 [ 241.016949][T24351] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 241.060205][T24356] loop4: detected capacity change from 0 to 11 [ 241.060592][T24356] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:39 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1a0000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:39 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960754a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 241.260926][T24367] loop4: detected capacity change from 0 to 11 [ 241.262383][T24367] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 241.341774][T24374] loop4: detected capacity change from 0 to 11 [ 241.357314][T24374] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:39 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x0, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r7, 0x4, 0xc0000) sendfile(r1, r7, 0x0, 0x800000080004105) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x30f41, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r8, 0x7, 0x0, 0x0, 0x0) 00:33:39 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960854a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:39 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1a1000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) readv(r2, &(0x7f0000001380)=[{&(0x7f0000000000)=""/42, 0x2a}, {&(0x7f0000000100)=""/252, 0xfc}, {&(0x7f0000000200)=""/50, 0x32}, {&(0x7f0000000240)=""/190, 0xbe}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/124, 0x7c}], 0x6) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000040)={0xffff, 0x401, 0x3, 0x5ea1, 0x0, 0x7fff}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000001400)) fcntl$setstatus(r1, 0x4, 0xc6c00) sendfile(r0, r1, 0x0, 0x800000080004105) [ 241.570339][ C1] sd 0:0:1:0: [sg0] tag#8083 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 241.578630][T24398] loop4: detected capacity change from 0 to 11 [ 241.580837][ C1] sd 0:0:1:0: [sg0] tag#8083 CDB: opcode=0xe5 (vendor) [ 241.589620][ C0] sd 0:0:1:0: [sg0] tag#8084 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 241.594032][ C1] sd 0:0:1:0: [sg0] tag#8083 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 241.604388][ C0] sd 0:0:1:0: [sg0] tag#8084 CDB: opcode=0xe5 (vendor) [ 241.613924][ C1] sd 0:0:1:0: [sg0] tag#8083 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 241.620764][ C0] sd 0:0:1:0: [sg0] tag#8084 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 241.630296][ C1] sd 0:0:1:0: [sg0] tag#8083 CDB[20]: ba [ 241.639825][ C0] sd 0:0:1:0: [sg0] tag#8084 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 241.654997][ C0] sd 0:0:1:0: [sg0] tag#8084 CDB[20]: ba 00:33:39 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1a2000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:39 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960954a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 241.759288][T24403] loop4: detected capacity change from 0 to 11 [ 241.829750][T24419] loop4: detected capacity change from 0 to 11 [ 241.878485][T24422] loop4: detected capacity change from 0 to 11 00:33:39 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1a3000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:39 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960a54a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 242.007963][T24436] loop4: detected capacity change from 0 to 11 00:33:39 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960b54a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:39 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1a4000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 242.084102][T24443] loop4: detected capacity change from 0 to 11 [ 242.155937][T24453] loop4: detected capacity change from 0 to 11 [ 242.197308][T24457] loop4: detected capacity change from 0 to 11 00:33:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:40 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960c54a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r7, 0x4, 0xc0000) sendfile(r1, r7, 0x0, 0x800000080004105) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x30f41, 0x0) 00:33:40 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x0, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:40 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1a5000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 242.453486][T24473] loop4: detected capacity change from 0 to 11 [ 242.461576][ C0] sd 0:0:1:0: [sg0] tag#8087 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 242.461604][ C0] sd 0:0:1:0: [sg0] tag#8087 CDB: opcode=0xe5 (vendor) [ 242.461623][ C0] sd 0:0:1:0: [sg0] tag#8087 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 242.461643][ C0] sd 0:0:1:0: [sg0] tag#8087 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 242.461662][ C0] sd 0:0:1:0: [sg0] tag#8087 CDB[20]: ba [ 242.475418][ C0] sd 0:0:1:0: [sg0] tag#8088 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 242.475464][ C0] sd 0:0:1:0: [sg0] tag#8088 CDB: opcode=0xe5 (vendor) [ 242.475479][ C0] sd 0:0:1:0: [sg0] tag#8088 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 242.475498][ C0] sd 0:0:1:0: [sg0] tag#8088 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 242.475518][ C0] sd 0:0:1:0: [sg0] tag#8088 CDB[20]: ba [ 242.504978][T24487] loop4: detected capacity change from 0 to 11 00:33:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fcntl$setstatus(r1, 0x4, 0xc0000) pread64(r0, &(0x7f0000000000)=""/50, 0x32, 0xb3) sendfile(r0, r1, 0x0, 0x800000080004105) 00:33:40 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960d54a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:40 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1a6000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 242.700433][T24506] loop4: detected capacity change from 0 to 11 00:33:40 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960e54a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 242.746933][T24509] loop4: detected capacity change from 0 to 11 00:33:40 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1a7000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 242.817885][T24516] loop4: detected capacity change from 0 to 11 00:33:40 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d961054a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 242.876207][T24525] loop4: detected capacity change from 0 to 11 00:33:40 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d961154a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 242.956043][T24533] loop4: detected capacity change from 0 to 11 [ 243.030135][T24543] loop4: detected capacity change from 0 to 11 [ 243.055873][T24546] loop4: detected capacity change from 0 to 11 00:33:41 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:41 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1a8000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:41 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d961254a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:41 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x0, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r7, 0x4, 0xc0000) sendfile(r1, r7, 0x0, 0x800000080004105) [ 243.492500][ C0] sd 0:0:1:0: [sg0] tag#8089 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 243.492523][ C0] sd 0:0:1:0: [sg0] tag#8089 CDB: opcode=0xe5 (vendor) [ 243.492542][ C0] sd 0:0:1:0: [sg0] tag#8089 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 243.504686][ C1] sd 0:0:1:0: [sg0] tag#8090 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 243.509755][ C0] sd 0:0:1:0: [sg0] tag#8089 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 243.519302][ C1] sd 0:0:1:0: [sg0] tag#8090 CDB: opcode=0xe5 (vendor) [ 243.529608][ C0] sd 0:0:1:0: [sg0] tag#8089 CDB[20]: ba [ 243.539137][ C1] sd 0:0:1:0: [sg0] tag#8090 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 243.561151][ C1] sd 0:0:1:0: [sg0] tag#8090 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 243.561170][ C1] sd 0:0:1:0: [sg0] tag#8090 CDB[20]: ba [ 243.561210][T24563] loop4: detected capacity change from 0 to 11 [ 243.583578][T24567] loop4: detected capacity change from 0 to 11 00:33:41 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fcntl$setstatus(r1, 0x4, 0xc0000) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) fcntl$setown(r2, 0x8, 0x0) sendfile(r0, r1, 0x0, 0x800000080004105) 00:33:41 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d962e54a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:41 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1a9000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 243.845560][T24589] loop4: detected capacity change from 0 to 11 00:33:41 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960425a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 243.915576][T24594] loop4: detected capacity change from 0 to 11 00:33:41 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1aa000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 243.994583][T24600] loop4: detected capacity change from 0 to 11 00:33:41 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7075eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 244.056100][T24608] loop4: detected capacity change from 0 to 11 00:33:41 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ab000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 244.141097][T24618] loop4: detected capacity change from 0 to 11 [ 244.195678][T24621] loop4: detected capacity change from 0 to 11 00:33:42 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7095eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:42 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x0, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:42 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') sendfile(r1, r7, 0x0, 0x800000080004105) [ 244.391609][ C0] sd 0:0:1:0: [sg0] tag#8091 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 244.391646][ C0] sd 0:0:1:0: [sg0] tag#8091 CDB: opcode=0xe5 (vendor) [ 244.391664][ C0] sd 0:0:1:0: [sg0] tag#8091 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 244.391699][ C0] sd 0:0:1:0: [sg0] tag#8091 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 244.391715][ C0] sd 0:0:1:0: [sg0] tag#8091 CDB[20]: ba 00:33:42 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ac000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 244.406108][ C1] sd 0:0:1:0: [sg0] tag#8092 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 244.430560][T24648] loop4: detected capacity change from 0 to 11 [ 244.431006][ C1] sd 0:0:1:0: [sg0] tag#8092 CDB: opcode=0xe5 (vendor) [ 244.469721][ C1] sd 0:0:1:0: [sg0] tag#8092 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 244.469744][ C1] sd 0:0:1:0: [sg0] tag#8092 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 244.469761][ C1] sd 0:0:1:0: [sg0] tag#8092 CDB[20]: ba [ 244.564259][T24662] loop4: detected capacity change from 0 to 11 00:33:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) gettid() r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(r1, &(0x7f0000000040)='oom_score\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r0, r2, 0x0, 0x800000080004105) 00:33:42 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a70a5eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:42 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ad000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:42 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fcntl$setstatus(r0, 0x4, 0xc0000) r1 = syz_open_dev$rtc(&(0x7f0000000000), 0x96b3, 0x2002) sendfile(r1, r0, 0x0, 0x8) 00:33:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fcntl$setstatus(r1, 0x4, 0xc0000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f00000000c0)=""/122) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_EXPECT_NAT={0x1bc, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x25}}, {0x14, 0x4, @private1}}}]}, @CTA_EXPECT_NAT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x29}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_NAT_TUPLE={0x6c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010101}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0xac, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x4f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x40001}, 0x40000) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000440)={0xcb52, 0x2, 0x7ff, 0x8, 0x4, "8769d3dd2e7aa0882b9146a21b9d6c032d21e2"}) sendfile(r0, r1, 0x0, 0x800000080004105) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r3, 0x407, 0x7000000) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f00000003c0)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000400)) [ 244.763371][T24673] loop4: detected capacity change from 0 to 11 [ 244.801688][T24682] loop4: detected capacity change from 0 to 11 00:33:42 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a70b5eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:42 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ae000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 244.944246][T24700] loop4: detected capacity change from 0 to 11 00:33:42 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7145eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 244.985154][T24705] loop4: detected capacity change from 0 to 11 [ 245.073090][T24717] loop4: detected capacity change from 0 to 11 [ 245.123514][T24723] loop4: detected capacity change from 0 to 11 00:33:43 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x0, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 245.269832][ C1] sd 0:0:1:0: [sg0] tag#8093 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 245.269856][ C1] sd 0:0:1:0: [sg0] tag#8093 CDB: opcode=0xe5 (vendor) [ 245.269873][ C1] sd 0:0:1:0: [sg0] tag#8093 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 245.269891][ C1] sd 0:0:1:0: [sg0] tag#8093 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 245.306395][ C1] sd 0:0:1:0: [sg0] tag#8093 CDB[20]: ba 00:33:43 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:43 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1af000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') sendfile(r1, r7, 0x0, 0x800000080004105) 00:33:43 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a72e5eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 245.423947][T24742] loop4: detected capacity change from 0 to 11 [ 245.425575][ C1] sd 0:0:1:0: [sg0] tag#8094 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 245.425605][ C1] sd 0:0:1:0: [sg0] tag#8094 CDB: opcode=0xe5 (vendor) [ 245.425620][ C1] sd 0:0:1:0: [sg0] tag#8094 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 245.425636][ C1] sd 0:0:1:0: [sg0] tag#8094 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 245.425655][ C1] sd 0:0:1:0: [sg0] tag#8094 CDB[20]: ba [ 245.491456][T24750] loop4: detected capacity change from 0 to 11 00:33:43 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x2e, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:43 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1b0000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 245.579826][T24765] loop4: detected capacity change from 0 to 11 [ 245.587833][T24765] EXT4-fs: 35 callbacks suppressed [ 245.587844][T24765] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:43 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x5}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 245.635219][T24768] loop4: detected capacity change from 0 to 11 [ 245.642022][T24768] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 245.726341][T24777] loop4: detected capacity change from 0 to 11 [ 245.735662][T24777] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 245.775268][T24782] loop4: detected capacity change from 0 to 11 [ 245.781821][T24782] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) openat(r2, &(0x7f0000000000)='./file0\x00', 0x80000, 0x0) 00:33:43 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1b1000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:43 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x9}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 245.909383][T24796] loop4: detected capacity change from 0 to 11 [ 245.909703][T24796] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:43 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x20000006}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 245.963667][T24803] loop4: detected capacity change from 0 to 11 [ 245.965458][T24803] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 246.083268][T24812] loop4: detected capacity change from 0 to 264192 [ 246.083880][T24812] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:44 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0x0, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 246.289969][ C0] sd 0:0:1:0: [sg0] tag#8095 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 246.289992][ C0] sd 0:0:1:0: [sg0] tag#8095 CDB: opcode=0xe5 (vendor) [ 246.307218][ C0] sd 0:0:1:0: [sg0] tag#8095 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 246.307231][ C0] sd 0:0:1:0: [sg0] tag#8095 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 246.307240][ C0] sd 0:0:1:0: [sg0] tag#8095 CDB[20]: ba 00:33:44 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1b2000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:44 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x2}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:44 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') sendfile(r1, r7, 0x0, 0x800000080004105) [ 246.558970][T24833] loop4: detected capacity change from 0 to 11 [ 246.560683][T24833] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 246.573523][ C0] sd 0:0:1:0: [sg0] tag#8096 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 246.584855][ C0] sd 0:0:1:0: [sg0] tag#8096 CDB: opcode=0xe5 (vendor) [ 246.584878][ C0] sd 0:0:1:0: [sg0] tag#8096 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 246.584897][ C0] sd 0:0:1:0: [sg0] tag#8096 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 246.584912][ C0] sd 0:0:1:0: [sg0] tag#8096 CDB[20]: ba [ 246.640159][T24843] loop4: detected capacity change from 0 to 11 [ 246.651371][T24843] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:44 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1b3000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:44 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x3}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 246.794338][T24859] loop4: detected capacity change from 0 to 11 [ 246.796140][T24859] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:44 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1b4000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 246.855254][T24862] loop4: detected capacity change from 0 to 11 00:33:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000024c0)='net/protocols\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) preadv(r1, &(0x7f0000002400)=[{&(0x7f00000000c0)=""/158, 0x9e}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/223, 0xdf}, {&(0x7f0000000000)=""/88, 0x58}, {&(0x7f0000001280)=""/32, 0x20}, {&(0x7f00000012c0)=""/122, 0x7a}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f00000013c0)=""/39, 0x27}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x9, 0x7, 0x79b7b58f) 00:33:44 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x4}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:33:44 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1b5000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 247.017227][T24878] loop4: detected capacity change from 0 to 11 [ 247.069242][T24893] loop4: detected capacity change from 0 to 11 00:33:45 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0x0, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:45 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x5}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:45 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1b6000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 247.350613][T24908] loop4: detected capacity change from 0 to 11 [ 247.359279][ C1] sd 0:0:1:0: [sg0] tag#8122 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 247.359306][ C1] sd 0:0:1:0: [sg0] tag#8122 CDB: opcode=0xe5 (vendor) [ 247.359325][ C1] sd 0:0:1:0: [sg0] tag#8122 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 247.359361][ C1] sd 0:0:1:0: [sg0] tag#8122 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 247.359376][ C1] sd 0:0:1:0: [sg0] tag#8122 CDB[20]: ba [ 247.385264][T24913] loop4: detected capacity change from 0 to 11 00:33:45 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000080004105) 00:33:45 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x6}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:45 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1b7000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000080004105) 00:33:45 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x7}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r5 = inotify_init() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4, r0, r5, r6, r1], 0x6) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000080004105) [ 247.684970][T24929] loop4: detected capacity change from 0 to 11 [ 247.690013][ C0] sd 0:0:1:0: [sg0] tag#8123 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 247.690036][ C0] sd 0:0:1:0: [sg0] tag#8123 CDB: opcode=0xe5 (vendor) [ 247.690059][ C0] sd 0:0:1:0: [sg0] tag#8123 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 247.690076][ C0] sd 0:0:1:0: [sg0] tag#8123 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 247.690091][ C0] sd 0:0:1:0: [sg0] tag#8123 CDB[20]: ba [ 247.726063][T24940] loop4: detected capacity change from 0 to 11 [ 247.795254][T24952] loop4: detected capacity change from 0 to 11 [ 247.831660][T24955] loop4: detected capacity change from 0 to 11 00:33:45 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960854a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r5, 0x4, 0xc0000) sendfile(r1, r5, 0x0, 0x800000080004105) [ 248.024881][T24965] loop0: detected capacity change from 0 to 11 00:33:46 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0x0, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:46 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1b8000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:46 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x8}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 248.332775][T24981] loop4: detected capacity change from 0 to 11 [ 248.340556][ C0] sd 0:0:1:0: [sg0] tag#8124 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 248.340583][ C0] sd 0:0:1:0: [sg0] tag#8124 CDB: opcode=0xe5 (vendor) [ 248.340601][ C0] sd 0:0:1:0: [sg0] tag#8124 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 248.340619][ C0] sd 0:0:1:0: [sg0] tag#8124 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 248.340636][ C0] sd 0:0:1:0: [sg0] tag#8124 CDB[20]: ba [ 248.398612][T24987] loop4: detected capacity change from 0 to 11 00:33:46 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x0, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:46 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:46 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x9}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:46 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1b9000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r4, 0x4, 0xc0000) sendfile(r1, r4, 0x0, 0x800000080004105) [ 248.698627][T25000] loop4: detected capacity change from 0 to 11 [ 248.712563][ C1] sd 0:0:1:0: [sg0] tag#8125 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 248.712590][ C1] sd 0:0:1:0: [sg0] tag#8125 CDB: opcode=0xe5 (vendor) [ 248.712607][ C1] sd 0:0:1:0: [sg0] tag#8125 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 248.712624][ C1] sd 0:0:1:0: [sg0] tag#8125 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 248.712639][ C1] sd 0:0:1:0: [sg0] tag#8125 CDB[20]: ba [ 248.767901][T25019] loop4: detected capacity change from 0 to 11 00:33:46 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xa}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:46 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ba000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 248.865397][T25029] loop4: detected capacity change from 0 to 11 00:33:46 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xb}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 248.914717][T25032] loop4: detected capacity change from 0 to 11 00:33:46 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1bb000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 248.993355][T25043] loop4: detected capacity change from 0 to 11 [ 249.044778][T25046] loop4: detected capacity change from 0 to 11 00:33:47 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x0, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:47 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xc}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1bc000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 249.267661][T25067] loop4: detected capacity change from 0 to 11 [ 249.315024][T25071] loop4: detected capacity change from 0 to 11 00:33:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r5, 0x4, 0xc0000) sendfile(r1, r5, 0x0, 0x800000080004105) 00:33:47 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xd}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1bd000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r3, 0x4, 0xc0000) sendfile(r1, r3, 0x0, 0x800000080004105) 00:33:47 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 249.662565][T25095] loop4: detected capacity change from 0 to 11 [ 249.671112][ C1] scsi_io_completion_action: 2 callbacks suppressed [ 249.671141][ C1] sd 0:0:1:0: [sg0] tag#8064 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 249.671165][ C1] sd 0:0:1:0: [sg0] tag#8064 CDB: opcode=0xe5 (vendor) [ 249.671184][ C1] sd 0:0:1:0: [sg0] tag#8064 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:33:47 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xe}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 249.671215][ C1] sd 0:0:1:0: [sg0] tag#8064 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 249.671230][ C1] sd 0:0:1:0: [sg0] tag#8064 CDB[20]: ba [ 249.691091][T25102] loop4: detected capacity change from 0 to 11 00:33:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1be000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 249.780310][T25111] loop4: detected capacity change from 0 to 11 [ 249.847697][T25118] loop4: detected capacity change from 0 to 11 00:33:47 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x10}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1bf000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 249.977546][T25129] loop4: detected capacity change from 0 to 11 00:33:47 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x0, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:47 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x11}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1c0000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 250.205422][T25149] loop4: detected capacity change from 0 to 11 [ 250.213540][ C0] sd 0:0:1:0: [sg0] tag#8065 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 250.213588][ C0] sd 0:0:1:0: [sg0] tag#8065 CDB: opcode=0xe5 (vendor) [ 250.230789][ C0] sd 0:0:1:0: [sg0] tag#8065 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 250.230809][ C0] sd 0:0:1:0: [sg0] tag#8065 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 250.230824][ C0] sd 0:0:1:0: [sg0] tag#8065 CDB[20]: ba [ 250.259690][T25156] loop4: detected capacity change from 0 to 11 00:33:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r5, 0x4, 0xc0000) sendfile(r1, r5, 0x0, 0x800000080004105) 00:33:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r3, 0x4, 0xc0000) sendfile(r1, r3, 0x0, 0x800000080004105) 00:33:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x12}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:48 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1c1000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 250.528334][T25172] loop4: detected capacity change from 0 to 11 [ 250.588836][T25181] loop4: detected capacity change from 0 to 11 00:33:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x22}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:48 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1c2000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:48 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 250.722004][T25196] loop4: detected capacity change from 0 to 11 [ 250.722294][T25196] EXT4-fs: 29 callbacks suppressed [ 250.722302][T25196] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 250.745860][ C0] sd 0:0:1:0: [sg0] tag#8066 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 250.756362][ C0] sd 0:0:1:0: [sg0] tag#8066 CDB: opcode=0xe5 (vendor) [ 250.756381][ C0] sd 0:0:1:0: [sg0] tag#8066 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 250.756397][ C0] sd 0:0:1:0: [sg0] tag#8066 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 250.756412][ C0] sd 0:0:1:0: [sg0] tag#8066 CDB[20]: ba 00:33:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x25}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:48 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1c3000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 250.816154][T25203] loop4: detected capacity change from 0 to 11 [ 250.816477][T25203] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 250.896294][T25214] loop4: detected capacity change from 0 to 11 [ 250.897944][T25214] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 250.959810][T25222] loop4: detected capacity change from 0 to 11 [ 250.966590][T25222] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:48 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x0, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x2e}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:48 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1c4000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r5, 0x4, 0xc0000) sendfile(r1, r5, 0x0, 0x800000080004105) 00:33:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r3, 0x4, 0xc0000) sendfile(r1, r3, 0x0, 0x800000080004105) [ 251.232644][T25239] loop4: detected capacity change from 0 to 11 [ 251.243318][ C1] sd 0:0:1:0: [sg0] tag#8067 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 251.253709][ C1] sd 0:0:1:0: [sg0] tag#8067 CDB: opcode=0xe5 (vendor) [ 251.253730][ C1] sd 0:0:1:0: [sg0] tag#8067 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 251.253750][ C1] sd 0:0:1:0: [sg0] tag#8067 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 251.253768][ C1] sd 0:0:1:0: [sg0] tag#8067 CDB[20]: ba [ 251.269910][T25239] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:49 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1c5000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 251.401517][T25260] loop4: detected capacity change from 0 to 11 [ 251.424704][T25260] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:49 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x300}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 251.522687][T25272] loop4: detected capacity change from 0 to 11 [ 251.538746][T25272] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:49 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1c6000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:49 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x500}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 251.600115][T25279] loop4: detected capacity change from 0 to 11 [ 251.600560][T25279] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 251.692160][T25293] loop4: detected capacity change from 0 to 11 [ 251.692640][T25293] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 251.734725][T25296] loop4: detected capacity change from 0 to 11 [ 251.734972][T25296] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:49 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x600}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:49 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1c7000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:49 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 251.955390][ C1] sd 0:0:1:0: [sg0] tag#8068 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 251.965780][ C1] sd 0:0:1:0: [sg0] tag#8068 CDB: opcode=0xe5 (vendor) [ 251.965804][ C1] sd 0:0:1:0: [sg0] tag#8068 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 251.965826][ C1] sd 0:0:1:0: [sg0] tag#8068 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 251.965842][ C1] sd 0:0:1:0: [sg0] tag#8068 CDB[20]: ba [ 251.966676][T25316] loop4: detected capacity change from 0 to 11 [ 252.069339][T25322] loop4: detected capacity change from 0 to 11 00:33:50 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') sendfile(r1, r5, 0x0, 0x800000080004105) 00:33:50 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r3, 0x4, 0xc0000) sendfile(r1, r3, 0x0, 0x800000080004105) 00:33:50 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x700}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:50 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1c8000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 252.427042][T25346] loop4: detected capacity change from 0 to 11 [ 252.433590][ C0] sd 0:0:1:0: [sg0] tag#8071 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 252.443998][ C0] sd 0:0:1:0: [sg0] tag#8071 CDB: opcode=0xe5 (vendor) [ 252.444060][ C0] sd 0:0:1:0: [sg0] tag#8071 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 252.444077][ C0] sd 0:0:1:0: [sg0] tag#8071 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 00:33:50 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x900}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 252.444094][ C0] sd 0:0:1:0: [sg0] tag#8071 CDB[20]: ba 00:33:50 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1c9000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 252.551457][T25366] loop4: detected capacity change from 0 to 11 [ 252.594493][T25370] loop4: detected capacity change from 0 to 11 00:33:50 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xa00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:50 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ca000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 252.704750][T25382] loop4: detected capacity change from 0 to 11 [ 252.754444][T25387] loop4: detected capacity change from 0 to 11 00:33:50 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xb00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 252.862041][T25398] loop4: detected capacity change from 0 to 11 00:33:50 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1cb000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 252.912963][T25403] loop4: detected capacity change from 0 to 11 00:33:50 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 253.075231][ C0] sd 0:0:1:0: [sg0] tag#8072 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 253.075256][ C0] sd 0:0:1:0: [sg0] tag#8072 CDB: opcode=0xe5 (vendor) [ 253.075287][ C0] sd 0:0:1:0: [sg0] tag#8072 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 253.075305][ C0] sd 0:0:1:0: [sg0] tag#8072 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 253.075323][ C0] sd 0:0:1:0: [sg0] tag#8072 CDB[20]: ba 00:33:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') sendfile(r1, r5, 0x0, 0x800000080004105) 00:33:51 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xc00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:33:51 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:51 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1cc000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 253.404073][T25435] loop4: detected capacity change from 0 to 11 [ 253.410582][ C1] sd 0:0:1:0: [sg0] tag#8073 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 253.410618][ C1] sd 0:0:1:0: [sg0] tag#8073 CDB: opcode=0xe5 (vendor) [ 253.410636][ C1] sd 0:0:1:0: [sg0] tag#8073 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 253.410657][ C1] sd 0:0:1:0: [sg0] tag#8073 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 253.447064][ C1] sd 0:0:1:0: [sg0] tag#8073 CDB[20]: ba 00:33:51 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xd00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:51 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1cd000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 253.502745][T25446] loop4: detected capacity change from 0 to 11 [ 253.606943][T25456] loop4: detected capacity change from 0 to 11 [ 253.644466][T25459] loop4: detected capacity change from 0 to 11 00:33:51 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ce000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:51 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xe00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:51 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x1100}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 253.751321][T25473] loop4: detected capacity change from 0 to 11 00:33:51 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x1200}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 253.824604][T25481] loop4: detected capacity change from 0 to 11 [ 253.861427][T25486] loop4: detected capacity change from 0 to 11 [ 253.933098][T25494] loop4: detected capacity change from 0 to 11 [ 253.954496][T25497] loop4: detected capacity change from 0 to 11 00:33:51 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1cf000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') sendfile(r1, r5, 0x0, 0x800000080004105) 00:33:51 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x2200}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) [ 254.107484][T25512] loop4: detected capacity change from 0 to 11 [ 254.151311][T25524] loop4: detected capacity change from 0 to 11 00:33:52 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:52 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:52 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x2500}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:52 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1d0000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000080004105) 00:33:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) [ 254.438859][T25542] loop4: detected capacity change from 0 to 11 [ 254.447505][ C0] sd 0:0:1:0: [sg0] tag#8074 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 254.449224][ C1] sd 0:0:1:0: [sg0] tag#8075 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 254.457886][ C0] sd 0:0:1:0: [sg0] tag#8074 CDB: opcode=0xe5 (vendor) [ 254.468203][ C1] sd 0:0:1:0: [sg0] tag#8075 CDB: opcode=0xe5 (vendor) 00:33:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000080004105) [ 254.475033][ C0] sd 0:0:1:0: [sg0] tag#8074 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 254.481873][ C1] sd 0:0:1:0: [sg0] tag#8075 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 254.491506][ C0] sd 0:0:1:0: [sg0] tag#8074 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 254.501041][ C1] sd 0:0:1:0: [sg0] tag#8075 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 254.510558][ C0] sd 0:0:1:0: [sg0] tag#8074 CDB[20]: ba [ 254.525789][ C1] sd 0:0:1:0: [sg0] tag#8075 CDB[20]: ba 00:33:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x2}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004}, 0x40408c8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000080004105) 00:33:52 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1d1000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:52 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x2e00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r4, 0x4, 0xc0000) sendfile(r1, r4, 0x0, 0x800000080004105) [ 254.643025][T25568] loop4: detected capacity change from 0 to 11 [ 254.741576][T25582] loop4: detected capacity change from 0 to 11 00:33:52 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1d2000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 254.793225][T25586] loop4: detected capacity change from 0 to 11 00:33:53 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x394) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 255.301721][ C1] sd 0:0:1:0: [sg0] tag#8076 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 255.301744][ C1] sd 0:0:1:0: [sg0] tag#8076 CDB: opcode=0xe5 (vendor) [ 255.301764][ C1] sd 0:0:1:0: [sg0] tag#8076 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 255.328646][ C1] sd 0:0:1:0: [sg0] tag#8076 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 255.328682][ C1] sd 0:0:1:0: [sg0] tag#8076 CDB[20]: ba 00:33:53 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:53 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x4000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:33:53 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1d3000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r3, 0x4, 0xc0000) sendfile(r1, r3, 0x0, 0x800000080004105) [ 255.444060][T25615] loop4: detected capacity change from 0 to 11 [ 255.459824][ C0] sd 0:0:1:0: [sg0] tag#8077 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 255.459853][ C0] sd 0:0:1:0: [sg0] tag#8077 CDB: opcode=0xe5 (vendor) [ 255.459871][ C0] sd 0:0:1:0: [sg0] tag#8077 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:33:53 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x80000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 255.459892][ C0] sd 0:0:1:0: [sg0] tag#8077 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 255.459911][ C0] sd 0:0:1:0: [sg0] tag#8077 CDB[20]: ba [ 255.531191][T25626] loop4: detected capacity change from 0 to 11 00:33:53 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1d4000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 255.591910][T25633] loop4: detected capacity change from 0 to 11 00:33:53 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x400000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 255.660737][T25640] loop4: detected capacity change from 0 to 11 00:33:53 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1d5000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 255.733834][T25649] loop4: detected capacity change from 0 to 11 [ 255.735623][T25649] EXT4-fs: 28 callbacks suppressed [ 255.735634][T25649] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 255.810390][T25659] loop4: detected capacity change from 0 to 11 [ 255.817250][T25659] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:53 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x1000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:53 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1d6000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 255.902873][T25667] loop4: detected capacity change from 0 to 11 [ 255.904482][T25667] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 255.957152][T25675] loop4: detected capacity change from 0 to 11 [ 255.957977][T25675] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:53 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x394) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 256.124651][ C1] sd 0:0:1:0: [sg0] tag#8078 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 256.124689][ C1] sd 0:0:1:0: [sg0] tag#8078 CDB: opcode=0xe5 (vendor) [ 256.124706][ C1] sd 0:0:1:0: [sg0] tag#8078 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 256.124726][ C1] sd 0:0:1:0: [sg0] tag#8078 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 256.124746][ C1] sd 0:0:1:0: [sg0] tag#8078 CDB[20]: ba 00:33:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1d7000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x2000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:33:54 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) inotify_init() r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r3, 0x4, 0xc0000) sendfile(r1, r3, 0x0, 0x800000080004105) [ 256.473890][T25702] loop4: detected capacity change from 0 to 11 [ 256.476565][T25702] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 256.476727][ C0] sd 0:0:1:0: [sg0] tag#8079 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 256.476759][ C0] sd 0:0:1:0: [sg0] tag#8079 CDB: opcode=0xe5 (vendor) [ 256.476790][ C0] sd 0:0:1:0: [sg0] tag#8079 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 256.476806][ C0] sd 0:0:1:0: [sg0] tag#8079 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 256.476821][ C0] sd 0:0:1:0: [sg0] tag#8079 CDB[20]: ba [ 256.520624][T25710] loop4: detected capacity change from 0 to 11 [ 256.555130][T25710] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x3000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1d8000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 256.671458][T25722] loop4: detected capacity change from 0 to 11 [ 256.672057][T25722] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x4000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1d9000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 256.766777][T25732] loop4: detected capacity change from 0 to 11 [ 256.767197][T25732] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 256.860852][T25742] loop4: detected capacity change from 0 to 11 [ 256.861108][T25742] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x5000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 256.914490][T25747] loop4: detected capacity change from 0 to 11 [ 256.914681][T25747] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1da000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 256.998624][T25754] loop4: detected capacity change from 0 to 11 00:33:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x6000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:54 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x394) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 257.145536][T25772] loop4: detected capacity change from 0 to 11 [ 257.159616][ C0] sd 0:0:1:0: [sg0] tag#8080 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 257.159644][ C0] sd 0:0:1:0: [sg0] tag#8080 CDB: opcode=0xe5 (vendor) [ 257.159661][ C0] sd 0:0:1:0: [sg0] tag#8080 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 257.159677][ C0] sd 0:0:1:0: [sg0] tag#8080 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 257.159692][ C0] sd 0:0:1:0: [sg0] tag#8080 CDB[20]: ba [ 257.187951][T25780] loop4: detected capacity change from 0 to 11 00:33:55 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000080004105) 00:33:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1db000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r3, 0x4, 0xc0000) sendfile(r1, r3, 0x0, 0x800000080004105) 00:33:55 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x7000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 257.498593][T25797] loop4: detected capacity change from 0 to 11 [ 257.508295][ C0] sd 0:0:1:0: [sg0] tag#8081 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 257.508350][ C0] sd 0:0:1:0: [sg0] tag#8081 CDB: opcode=0xe5 (vendor) [ 257.508366][ C0] sd 0:0:1:0: [sg0] tag#8081 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:33:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000080004105) [ 257.508384][ C0] sd 0:0:1:0: [sg0] tag#8081 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 257.508428][ C0] sd 0:0:1:0: [sg0] tag#8081 CDB[20]: ba [ 257.543669][T25804] loop4: detected capacity change from 0 to 11 00:33:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000080004105) 00:33:55 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x8000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1dc000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) [ 257.662308][T25822] loop4: detected capacity change from 0 to 11 00:33:55 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x9000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 257.722105][T25835] loop4: detected capacity change from 0 to 11 [ 257.777955][T25842] loop4: detected capacity change from 0 to 11 [ 257.829886][T25848] loop4: detected capacity change from 0 to 11 00:33:55 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x0, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 258.059715][ C1] sd 0:0:1:0: [sg0] tag#8082 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 258.059740][ C1] sd 0:0:1:0: [sg0] tag#8082 CDB: opcode=0xe5 (vendor) [ 258.059757][ C1] sd 0:0:1:0: [sg0] tag#8082 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 258.059777][ C1] sd 0:0:1:0: [sg0] tag#8082 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 258.059796][ C1] sd 0:0:1:0: [sg0] tag#8082 CDB[20]: ba 00:33:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1dd000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:56 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xa000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r3, 0x4, 0xc0000) sendfile(r1, r3, 0x0, 0x800000080004105) 00:33:56 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:56 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:33:56 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xb000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 258.477558][T25870] loop4: detected capacity change from 0 to 11 [ 258.485431][ C1] sd 0:0:1:0: [sg0] tag#8083 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 258.485457][ C1] sd 0:0:1:0: [sg0] tag#8083 CDB: opcode=0xe5 (vendor) [ 258.485487][ C1] sd 0:0:1:0: [sg0] tag#8083 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 258.485505][ C1] sd 0:0:1:0: [sg0] tag#8083 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 258.485541][ C1] sd 0:0:1:0: [sg0] tag#8083 CDB[20]: ba [ 258.559455][T25886] loop4: detected capacity change from 0 to 11 00:33:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1de000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:56 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xc000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 258.616065][T25890] loop4: detected capacity change from 0 to 11 00:33:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1df000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 258.704714][T25903] loop4: detected capacity change from 0 to 11 [ 258.741896][T25908] loop4: detected capacity change from 0 to 11 00:33:56 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xd000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 258.838628][T25921] loop4: detected capacity change from 0 to 11 00:33:56 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xe000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 258.898149][T25924] loop4: detected capacity change from 0 to 11 [ 258.969744][T25932] loop4: detected capacity change from 0 to 11 00:33:56 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x0, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1e0000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r3, 0x4, 0xc0000) sendfile(r1, r3, 0x0, 0x800000080004105) 00:33:56 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x10000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 259.013951][T25935] loop4: detected capacity change from 0 to 11 [ 259.086820][ C0] sd 0:0:1:0: [sg0] tag#8084 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 259.086843][ C0] sd 0:0:1:0: [sg0] tag#8084 CDB: opcode=0xe5 (vendor) [ 259.086875][ C0] sd 0:0:1:0: [sg0] tag#8084 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 259.086893][ C0] sd 0:0:1:0: [sg0] tag#8084 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 259.105476][T25950] loop4: detected capacity change from 0 to 11 [ 259.113734][ C0] sd 0:0:1:0: [sg0] tag#8084 CDB[20]: ba [ 259.194068][T25957] loop4: detected capacity change from 0 to 11 00:33:57 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1e1000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:57 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x11000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 259.482466][T25971] loop4: detected capacity change from 0 to 11 [ 259.487540][ C0] sd 0:0:1:0: [sg0] tag#8085 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 259.499067][ C0] sd 0:0:1:0: [sg0] tag#8085 CDB: opcode=0xe5 (vendor) [ 259.499085][ C0] sd 0:0:1:0: [sg0] tag#8085 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 259.499103][ C0] sd 0:0:1:0: [sg0] tag#8085 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 259.499119][ C0] sd 0:0:1:0: [sg0] tag#8085 CDB[20]: ba 00:33:57 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x12000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 259.553548][T25980] loop4: detected capacity change from 0 to 11 00:33:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1e2000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 259.624910][T25988] loop4: detected capacity change from 0 to 11 [ 259.678846][T25997] loop4: detected capacity change from 0 to 11 00:33:57 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x22000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 259.774964][T26007] loop4: detected capacity change from 0 to 11 00:33:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1e3000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 259.819523][T26012] loop4: detected capacity change from 0 to 11 00:33:57 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x0, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:57 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x25000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r3, 0x4, 0xc0000) sendfile(r1, r3, 0x0, 0x800000080004105) 00:33:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1e4000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 260.044826][T26036] loop4: detected capacity change from 0 to 11 [ 260.109183][T26044] loop4: detected capacity change from 0 to 11 00:33:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:33:58 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x2e000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1e5000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) [ 260.450017][ C1] scsi_io_completion_action: 1 callbacks suppressed [ 260.450044][ C1] sd 0:0:1:0: [sg0] tag#8087 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 260.450087][ C1] sd 0:0:1:0: [sg0] tag#8087 CDB: opcode=0xe5 (vendor) [ 260.450108][ C1] sd 0:0:1:0: [sg0] tag#8087 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:33:58 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x40000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1e6000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 260.450127][ C1] sd 0:0:1:0: [sg0] tag#8087 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 260.450143][ C1] sd 0:0:1:0: [sg0] tag#8087 CDB[20]: ba [ 260.481260][T26064] loop4: detected capacity change from 0 to 11 [ 260.533860][T26070] loop4: detected capacity change from 0 to 11 [ 260.620166][T26084] loop4: detected capacity change from 0 to 11 00:33:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1e7000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 260.682492][T26089] loop4: detected capacity change from 0 to 11 00:33:58 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x0, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:58 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x8cffffff}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1e8000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 260.986890][T26110] loop4: detected capacity change from 0 to 11 [ 260.987043][ C0] sd 0:0:1:0: [sg0] tag#8088 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 260.995191][T26110] EXT4-fs: 32 callbacks suppressed [ 260.995200][T26110] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 261.003432][ C0] sd 0:0:1:0: [sg0] tag#8088 CDB: opcode=0xe5 (vendor) [ 261.024598][ C0] sd 0:0:1:0: [sg0] tag#8088 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 261.024630][ C0] sd 0:0:1:0: [sg0] tag#8088 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 261.024659][ C0] sd 0:0:1:0: [sg0] tag#8088 CDB[20]: ba 00:33:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1e9000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 261.086410][T26119] loop4: detected capacity change from 0 to 11 [ 261.103873][T26119] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:33:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xf6ffffff}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 261.340889][T26136] loop4: detected capacity change from 0 to 11 [ 261.341283][T26136] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 261.384577][T26145] loop4: detected capacity change from 0 to 11 [ 261.384759][T26145] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:59 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:33:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ea000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:33:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xfdfdffff}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 261.551462][ C1] sd 0:0:1:0: [sg0] tag#8089 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 261.561863][ C1] sd 0:0:1:0: [sg0] tag#8089 CDB: opcode=0xe5 (vendor) [ 261.561882][ C1] sd 0:0:1:0: [sg0] tag#8089 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 261.561899][ C1] sd 0:0:1:0: [sg0] tag#8089 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 261.561913][ C1] sd 0:0:1:0: [sg0] tag#8089 CDB[20]: ba [ 261.592257][T26161] loop4: detected capacity change from 0 to 11 [ 261.611847][T26161] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 261.661110][T26173] loop4: detected capacity change from 0 to 11 [ 261.661646][T26173] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:59 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x0, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:33:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:33:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xfeffffff}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:33:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1eb000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:33:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) [ 261.970857][ C1] sd 0:0:1:0: [sg0] tag#8090 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 261.970881][ C1] sd 0:0:1:0: [sg0] tag#8090 CDB: opcode=0xe5 (vendor) [ 261.970917][ C1] sd 0:0:1:0: [sg0] tag#8090 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 261.970933][ C1] sd 0:0:1:0: [sg0] tag#8090 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 261.970959][ C1] sd 0:0:1:0: [sg0] tag#8090 CDB[20]: ba [ 261.987748][T26193] loop4: detected capacity change from 0 to 11 [ 262.063533][T26193] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:33:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ec000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 262.116209][T26200] loop4: detected capacity change from 0 to 11 [ 262.116487][T26200] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xfffffdfd}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ed000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 262.504034][ C0] sd 0:0:1:0: [sg0] tag#8091 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 262.514450][ C0] sd 0:0:1:0: [sg0] tag#8091 CDB: opcode=0xe5 (vendor) [ 262.514468][ C0] sd 0:0:1:0: [sg0] tag#8091 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 262.514501][ C0] sd 0:0:1:0: [sg0] tag#8091 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 262.514517][ C0] sd 0:0:1:0: [sg0] tag#8091 CDB[20]: ba [ 262.536462][T26224] loop4: detected capacity change from 0 to 11 [ 262.537806][T26224] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 262.575941][T26228] loop4: detected capacity change from 0 to 11 [ 262.576440][T26228] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xffffff7f}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ee000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 262.713713][T26241] loop4: detected capacity change from 0 to 11 00:34:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 262.813953][T26248] loop4: detected capacity change from 0 to 11 00:34:00 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x0, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:34:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ef000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xffffff8c}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 262.994400][ C0] sd 0:0:1:0: [sg0] tag#8092 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 262.994426][ C0] sd 0:0:1:0: [sg0] tag#8092 CDB: opcode=0xe5 (vendor) [ 262.994448][ C0] sd 0:0:1:0: [sg0] tag#8092 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 262.994476][ C0] sd 0:0:1:0: [sg0] tag#8092 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 262.994493][ C0] sd 0:0:1:0: [sg0] tag#8092 CDB[20]: ba [ 263.002778][T26267] loop4: detected capacity change from 0 to 11 00:34:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xfffffff6}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 263.099177][T26276] loop4: detected capacity change from 0 to 11 00:34:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1f0000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xfffffffe}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 263.171144][T26283] loop4: detected capacity change from 0 to 11 [ 263.203353][T26287] loop4: detected capacity change from 0 to 11 [ 263.277560][T26297] loop4: detected capacity change from 0 to 11 00:34:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x80000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 263.331321][T26301] loop4: detected capacity change from 0 to 11 [ 263.418923][T26310] loop4: detected capacity change from 0 to 11 00:34:01 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1f1000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 263.473110][T26314] loop4: detected capacity change from 0 to 11 00:34:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x1000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 263.551478][ C0] sd 0:0:1:0: [sg0] tag#8093 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 263.561982][ C0] sd 0:0:1:0: [sg0] tag#8093 CDB: opcode=0xe5 (vendor) [ 263.561999][ C0] sd 0:0:1:0: [sg0] tag#8093 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 263.562020][ C0] sd 0:0:1:0: [sg0] tag#8093 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 263.562039][ C0] sd 0:0:1:0: [sg0] tag#8093 CDB[20]: ba [ 263.598605][T26326] loop4: detected capacity change from 0 to 11 [ 263.681940][T26335] loop4: detected capacity change from 0 to 11 00:34:01 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0x0, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1f2000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x40000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) syz_io_uring_complete(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:34:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0x0) sendfile(r0, r1, 0x0, 0x800000080004105) [ 263.982922][ C0] sd 0:0:1:0: [sg0] tag#8094 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 263.993349][ C0] sd 0:0:1:0: [sg0] tag#8094 CDB: opcode=0xe5 (vendor) [ 263.993368][ C0] sd 0:0:1:0: [sg0] tag#8094 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 263.993387][ C0] sd 0:0:1:0: [sg0] tag#8094 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 00:34:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x100000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 263.993415][ C0] sd 0:0:1:0: [sg0] tag#8094 CDB[20]: ba [ 264.002525][T26358] loop4: detected capacity change from 0 to 11 [ 264.053178][T26368] loop4: detected capacity change from 0 to 11 00:34:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1f3000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 264.141298][T26374] loop4: detected capacity change from 0 to 11 [ 264.182535][T26382] loop4: detected capacity change from 0 to 11 00:34:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x200000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 264.286630][T26390] loop4: detected capacity change from 0 to 11 [ 264.355240][T26397] loop4: detected capacity change from 0 to 11 00:34:02 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1f4000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:02 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x300000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 264.552058][T26411] loop4: detected capacity change from 0 to 11 [ 264.560030][ C0] sd 0:0:1:0: [sg0] tag#8095 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 264.560055][ C0] sd 0:0:1:0: [sg0] tag#8095 CDB: opcode=0xe5 (vendor) [ 264.560088][ C0] sd 0:0:1:0: [sg0] tag#8095 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 264.560107][ C0] sd 0:0:1:0: [sg0] tag#8095 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 00:34:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x400000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 264.560124][ C0] sd 0:0:1:0: [sg0] tag#8095 CDB[20]: ba [ 264.613405][T26414] loop4: detected capacity change from 0 to 11 [ 264.688521][T26422] loop4: detected capacity change from 0 to 11 [ 264.721207][T26426] loop4: detected capacity change from 0 to 11 00:34:02 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0x0, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:02 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1f5000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x500000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:34:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0x0) sendfile(r0, r1, 0x0, 0x800000080004105) [ 264.963505][ C1] sd 0:0:1:0: [sg0] tag#8096 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 264.963533][ C1] sd 0:0:1:0: [sg0] tag#8096 CDB: opcode=0xe5 (vendor) [ 264.963554][ C1] sd 0:0:1:0: [sg0] tag#8096 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 264.963575][ C1] sd 0:0:1:0: [sg0] tag#8096 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 264.963591][ C1] sd 0:0:1:0: [sg0] tag#8096 CDB[20]: ba [ 264.991542][T26447] loop4: detected capacity change from 0 to 11 00:34:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x600000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:02 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1f6000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 265.082494][T26454] loop4: detected capacity change from 0 to 11 [ 265.164684][T26462] loop4: detected capacity change from 0 to 11 00:34:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x700000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 265.206799][T26468] loop4: detected capacity change from 0 to 11 00:34:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1f7000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 265.299225][T26474] loop4: detected capacity change from 0 to 11 [ 265.405481][T26484] loop4: detected capacity change from 0 to 11 00:34:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1f8000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x800000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 265.564287][T26499] loop4: detected capacity change from 0 to 11 [ 265.571570][ C1] sd 0:0:1:0: [sg0] tag#8097 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 265.583026][ C1] sd 0:0:1:0: [sg0] tag#8097 CDB: opcode=0xe5 (vendor) [ 265.583047][ C1] sd 0:0:1:0: [sg0] tag#8097 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 265.583062][ C1] sd 0:0:1:0: [sg0] tag#8097 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 265.583078][ C1] sd 0:0:1:0: [sg0] tag#8097 CDB[20]: ba [ 265.637512][T26506] loop4: detected capacity change from 0 to 11 00:34:03 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0x0, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x900000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1f9000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:34:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0x0) sendfile(r0, r1, 0x0, 0x800000080004105) [ 265.973535][ C0] sd 0:0:1:0: [sg0] tag#8098 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 265.973562][ C0] sd 0:0:1:0: [sg0] tag#8098 CDB: opcode=0xe5 (vendor) [ 265.973580][ C0] sd 0:0:1:0: [sg0] tag#8098 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 265.973597][ C0] sd 0:0:1:0: [sg0] tag#8098 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 265.973618][ C0] sd 0:0:1:0: [sg0] tag#8098 CDB[20]: ba [ 265.979376][T26531] loop4: detected capacity change from 0 to 11 [ 266.024394][T26531] EXT4-fs: 30 callbacks suppressed [ 266.024404][T26531] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 266.060946][T26531] loop4: detected capacity change from 0 to 11 [ 266.061258][T26531] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1fa000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xa00000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 266.173008][T26551] loop4: detected capacity change from 0 to 11 [ 266.192864][T26551] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xb00000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 266.249815][T26559] loop4: detected capacity change from 0 to 11 [ 266.257897][T26559] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:04 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1fb000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 266.335668][T26566] loop4: detected capacity change from 0 to 11 [ 266.337270][T26566] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xc00000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 266.383092][T26570] loop4: detected capacity change from 0 to 11 [ 266.389715][T26570] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 266.461793][T26580] loop4: detected capacity change from 0 to 11 [ 266.463387][T26580] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 266.529074][T26588] loop4: detected capacity change from 0 to 11 [ 266.549513][T26588] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {0x0, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:04 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1fc000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 266.645221][ C1] sd 0:0:1:0: [sg0] tag#8099 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 266.645252][ C1] sd 0:0:1:0: [sg0] tag#8099 CDB: opcode=0xe5 (vendor) [ 266.645270][ C1] sd 0:0:1:0: [sg0] tag#8099 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 266.645287][ C1] sd 0:0:1:0: [sg0] tag#8099 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 266.645319][ C1] sd 0:0:1:0: [sg0] tag#8099 CDB[20]: ba 00:34:04 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x0, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xd00000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:04 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1fd000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:34:04 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r0, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004105) 00:34:04 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r0, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004105) 00:34:04 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r0, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004105) [ 267.001278][ C0] sd 0:0:1:0: [sg0] tag#8100 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 267.001312][ C0] sd 0:0:1:0: [sg0] tag#8100 CDB: opcode=0xe5 (vendor) [ 267.001348][ C0] sd 0:0:1:0: [sg0] tag#8100 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:34:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004105) [ 267.001367][ C0] sd 0:0:1:0: [sg0] tag#8100 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 267.001383][ C0] sd 0:0:1:0: [sg0] tag#8100 CDB[20]: ba [ 267.021212][T26619] loop4: detected capacity change from 0 to 11 [ 267.021591][T26619] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 267.092886][T26633] loop4: detected capacity change from 0 to 11 00:34:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004105) [ 267.100492][T26633] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xe00000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 267.208757][T26648] loop4: detected capacity change from 0 to 11 [ 267.327128][T26656] loop4: detected capacity change from 0 to 11 00:34:05 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {0x0, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1fe000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 267.575953][ C0] sd 0:0:1:0: [sg0] tag#8101 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 267.575976][ C0] sd 0:0:1:0: [sg0] tag#8101 CDB: opcode=0xe5 (vendor) [ 267.575993][ C0] sd 0:0:1:0: [sg0] tag#8101 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 267.576011][ C0] sd 0:0:1:0: [sg0] tag#8101 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 267.576028][ C0] sd 0:0:1:0: [sg0] tag#8101 CDB[20]: ba 00:34:05 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x0, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004105) 00:34:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x1000000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x1ff000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:34:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x0) [ 267.948804][T26685] loop4: detected capacity change from 0 to 11 [ 267.957740][ C0] sd 0:0:1:0: [sg0] tag#8102 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 267.957768][ C0] sd 0:0:1:0: [sg0] tag#8102 CDB: opcode=0xe5 (vendor) [ 267.957806][ C0] sd 0:0:1:0: [sg0] tag#8102 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:34:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x1100000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x0) [ 267.957827][ C0] sd 0:0:1:0: [sg0] tag#8102 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 267.957843][ C0] sd 0:0:1:0: [sg0] tag#8102 CDB[20]: ba [ 267.997995][T26690] loop4: detected capacity change from 0 to 11 00:34:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x0) 00:34:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x200000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 268.078747][T26707] loop4: detected capacity change from 0 to 11 [ 268.133335][T26712] loop4: detected capacity change from 0 to 11 00:34:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x1200000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:06 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) [ 268.526106][T26734] loop4: detected capacity change from 0 to 11 [ 268.586898][T26740] loop4: detected capacity change from 0 to 11 00:34:06 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x0, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:06 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x201000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {0x0, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:06 executing program 1: fsopen(&(0x7f0000000040)='securityfs\x00', 0x0) 00:34:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x2200000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) [ 268.883581][ C0] sd 0:0:1:0: [sg0] tag#8103 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 268.890003][ C1] sd 0:0:1:0: [sg0] tag#8104 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 268.893968][ C0] sd 0:0:1:0: [sg0] tag#8103 CDB: opcode=0xe5 (vendor) [ 268.904290][ C1] sd 0:0:1:0: [sg0] tag#8104 CDB: opcode=0xe5 (vendor) [ 268.911219][ C0] sd 0:0:1:0: [sg0] tag#8103 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:34:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) [ 268.918056][ C1] sd 0:0:1:0: [sg0] tag#8104 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 268.928537][ C0] sd 0:0:1:0: [sg0] tag#8103 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 268.938175][ C1] sd 0:0:1:0: [sg0] tag#8104 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 268.947872][ C0] sd 0:0:1:0: [sg0] tag#8103 CDB[20]: ba [ 268.957430][ C1] sd 0:0:1:0: [sg0] tag#8104 CDB[20]: ba [ 268.970101][T26763] loop4: detected capacity change from 0 to 11 00:34:06 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r0, &(0x7f0000006e40)=[{{0x0, 0x0, 0x0, 0xc0, &(0x7f0000000c00)=[{0x10}], 0x10}}], 0x1, 0x0) 00:34:06 executing program 1: syz_mount_image$vfat(&(0x7f00000011c0), &(0x7f0000001200)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000200)={[{@fat=@dmask}]}) 00:34:06 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x202000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x2500000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 269.051458][T26763] loop4: detected capacity change from 0 to 11 [ 269.087644][T26781] FAT-fs (loop1): bogus number of reserved sectors [ 269.087685][T26781] FAT-fs (loop1): Can't find a valid FAT filesystem [ 269.120291][T26787] loop4: detected capacity change from 0 to 11 [ 269.129746][T26781] FAT-fs (loop1): bogus number of reserved sectors [ 269.129762][T26781] FAT-fs (loop1): Can't find a valid FAT filesystem 00:34:07 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x2e00000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 269.161770][T26794] loop4: detected capacity change from 0 to 11 [ 269.241593][T26803] loop4: detected capacity change from 0 to 11 [ 269.302601][T26807] loop4: detected capacity change from 0 to 11 00:34:07 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x0, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:07 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "77ba057cc47bd5fa53071bd5e9b8d6fdc820e1030ca962d483c19759594fbca1b20b3caeaf6cea10dc7fbafbfc1fba2af358be6e616bc901dbcb6db25a71f612"}, 0x48, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz', 0x3}, r0) [ 269.585065][ C0] sd 0:0:1:0: [sg0] tag#8105 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 269.585103][ C0] sd 0:0:1:0: [sg0] tag#8105 CDB: opcode=0xe5 (vendor) [ 269.585123][ C0] sd 0:0:1:0: [sg0] tag#8105 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 269.585140][ C0] sd 0:0:1:0: [sg0] tag#8105 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 269.585156][ C0] sd 0:0:1:0: [sg0] tag#8105 CDB[20]: ba 00:34:07 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:07 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x203000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:07 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x4000000000000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:34:07 executing program 1: syz_open_dev$rtc(&(0x7f0000000040), 0x8001, 0x0) 00:34:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r1, r0) 00:34:07 executing program 1: r0 = creat(&(0x7f0000000800)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x4}) [ 269.891166][ C1] sd 0:0:1:0: [sg0] tag#8106 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 269.891188][ C1] sd 0:0:1:0: [sg0] tag#8106 CDB: opcode=0xe5 (vendor) [ 269.891204][ C1] sd 0:0:1:0: [sg0] tag#8106 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 269.891226][ C1] sd 0:0:1:0: [sg0] tag#8106 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 269.891264][ C1] sd 0:0:1:0: [sg0] tag#8106 CDB[20]: ba [ 269.899527][T26834] loop4: detected capacity change from 0 to 11 00:34:07 executing program 1: io_setup(0xc48, &(0x7f0000000040)=0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_destroy(r1) io_destroy(r0) io_setup(0x5, &(0x7f0000000080)=0x0) io_destroy(r2) 00:34:07 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x8cffffff00000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 269.998671][T26853] loop4: detected capacity change from 0 to 11 00:34:07 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x204000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 270.061407][T26862] loop4: detected capacity change from 0 to 11 [ 270.112787][T26865] loop4: detected capacity change from 0 to 11 00:34:08 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x0, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x89a0, &(0x7f00000001c0)={0x0, @nl=@unspec, @vsock, @ax25={0x3, @bcast}}) 00:34:08 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:08 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xf6ffffff00000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:08 executing program 1: r0 = fsopen(&(0x7f0000000000)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='posixacl\x00', 0x0, 0x0) 00:34:08 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x205000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) 00:34:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x5451, 0x0) [ 270.828067][T26900] loop4: detected capacity change from 0 to 11 [ 270.837206][ C0] scsi_io_completion_action: 1 callbacks suppressed [ 270.837232][ C0] sd 0:0:1:0: [sg0] tag#8108 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 270.854501][ C0] sd 0:0:1:0: [sg0] tag#8108 CDB: opcode=0xe5 (vendor) [ 270.854533][ C0] sd 0:0:1:0: [sg0] tag#8108 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:34:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000152000000001"], 0x38}}, 0x0) 00:34:08 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xfdfdffff00000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 270.854554][ C0] sd 0:0:1:0: [sg0] tag#8108 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 270.854572][ C0] sd 0:0:1:0: [sg0] tag#8108 CDB[20]: ba [ 270.888427][T26909] loop4: detected capacity change from 0 to 11 00:34:08 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) 00:34:08 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x206000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 270.991793][T26928] loop4: detected capacity change from 0 to 11 [ 271.059187][T26940] loop4: detected capacity change from 0 to 11 [ 271.059369][T26940] EXT4-fs: 20 callbacks suppressed [ 271.059378][T26940] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:09 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x0, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20}]}) [ 271.370355][ C1] sd 0:0:1:0: [sg0] tag#8109 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 271.380751][ C1] sd 0:0:1:0: [sg0] tag#8109 CDB: opcode=0xe5 (vendor) [ 271.387645][ C1] sd 0:0:1:0: [sg0] tag#8109 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 271.397315][ C1] sd 0:0:1:0: [sg0] tag#8109 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 271.397332][ C1] sd 0:0:1:0: [sg0] tag#8109 CDB[20]: ba 00:34:09 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x207000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:09 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xfeffffff00000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000080004105) 00:34:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f00000009c0)={&(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0x18}, 0x2000c001) 00:34:09 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000080004105) 00:34:09 executing program 1: clock_gettime(0x0, &(0x7f0000000280)={0x0}) pselect6(0x0, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, &(0x7f00000002c0)={r0}, 0x0) [ 271.770689][T26967] loop4: detected capacity change from 0 to 11 [ 271.787287][T26967] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:09 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xffffff7f00000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000080004105) [ 271.792852][ C1] sd 0:0:1:0: [sg0] tag#8110 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 271.792874][ C1] sd 0:0:1:0: [sg0] tag#8110 CDB: opcode=0xe5 (vendor) [ 271.792891][ C1] sd 0:0:1:0: [sg0] tag#8110 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:34:09 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x208000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 271.792926][ C1] sd 0:0:1:0: [sg0] tag#8110 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 271.792947][ C1] sd 0:0:1:0: [sg0] tag#8110 CDB[20]: ba [ 271.824720][T26982] loop4: detected capacity change from 0 to 11 [ 271.825041][T26982] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 271.904357][T26994] loop4: detected capacity change from 0 to 11 [ 271.904675][T26994] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 271.956444][T27005] loop4: detected capacity change from 0 to 11 [ 271.956729][T27005] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:10 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x0, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001780)=0x6, 0x4) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r2, 0x4, 0xc0000) sendfile(r1, r2, 0x0, 0x800000080004105) [ 272.301034][ C0] sd 0:0:1:0: [sg0] tag#8111 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 272.311732][ C0] sd 0:0:1:0: [sg0] tag#8111 CDB: opcode=0xe5 (vendor) [ 272.311752][ C0] sd 0:0:1:0: [sg0] tag#8111 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 272.311768][ C0] sd 0:0:1:0: [sg0] tag#8111 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 272.311784][ C0] sd 0:0:1:0: [sg0] tag#8111 CDB[20]: ba 00:34:10 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0xffffffff00000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:10 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x209000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:10 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x81) sendmmsg(r0, &(0x7f0000005dc0)=[{{&(0x7f0000000440)=@un=@abs, 0x80, 0x0, 0x300}}], 0x1, 0x0) 00:34:10 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:34:10 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg(r0, &(0x7f0000002e00)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'vlan0\x00'}}, 0x80, 0x0, 0x3e80}}], 0x1, 0x0) 00:34:10 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 272.737215][T27029] loop4: detected capacity change from 0 to 11 [ 272.737537][ C1] sd 0:0:1:0: [sg0] tag#8112 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 00:34:10 executing program 1: recvmsg$unix(0xffffffffffffffff, 0x0, 0x80000001) [ 272.737563][ C1] sd 0:0:1:0: [sg0] tag#8112 CDB: opcode=0xe5 (vendor) [ 272.737591][ C1] sd 0:0:1:0: [sg0] tag#8112 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 272.737607][ C1] sd 0:0:1:0: [sg0] tag#8112 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 272.737622][ C1] sd 0:0:1:0: [sg0] tag#8112 CDB[20]: ba [ 272.738331][T27029] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:10 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x2}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 272.784200][T27029] loop4: detected capacity change from 0 to 11 [ 272.784516][T27029] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:10 executing program 1: r0 = epoll_create(0x7238) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) [ 272.892821][T27056] loop4: detected capacity change from 0 to 11 [ 272.893138][T27056] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 272.957710][T27068] loop4: detected capacity change from 0 to 11 [ 272.964378][T27068] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:11 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x0, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:11 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x20a000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 273.262719][ C1] sd 0:0:1:0: [sg0] tag#8113 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 273.262734][ C1] sd 0:0:1:0: [sg0] tag#8113 CDB: opcode=0xe5 (vendor) [ 273.262763][ C1] sd 0:0:1:0: [sg0] tag#8113 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 273.262773][ C1] sd 0:0:1:0: [sg0] tag#8113 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 273.262783][ C1] sd 0:0:1:0: [sg0] tag#8113 CDB[20]: ba 00:34:11 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x3}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000009c0)={&(0x7f00000001c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@hopopts={{0x28, 0x29, 0x32, {0x0, 0x1, '\x00', [@jumbo, @generic, @padn]}}}], 0x28}, 0x0) 00:34:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:34:11 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x20b000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:11 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) sendmsg$inet6(r2, &(0x7f0000001780)={&(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, 0x0}, 0x20040810) [ 273.681282][T27096] loop4: detected capacity change from 0 to 11 [ 273.687360][ C1] sd 0:0:1:0: [sg0] tag#8114 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 273.697897][ C1] sd 0:0:1:0: [sg0] tag#8114 CDB: opcode=0xe5 (vendor) [ 273.697920][ C1] sd 0:0:1:0: [sg0] tag#8114 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 273.697952][ C1] sd 0:0:1:0: [sg0] tag#8114 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 00:34:11 executing program 1: r0 = socket$inet(0x11, 0x803, 0x0) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f00000000c0)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)="bd6001c182dcf79085dc1d6816b90ab399f292a454b6848db85b25c7287dd59d85db4fcd33f7fd1913b5ed3d142ea1816958aefc7447", 0x36}], 0x1}}, {{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0, 0x0, &(0x7f0000000500)=[{0x10}], 0x10}}], 0x2, 0x0) 00:34:11 executing program 1: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000580), &(0x7f00000005c0)={'fscrypt:', @desc4}, &(0x7f0000000600)={0x0, "aaff55907a501aa4d8242b4d52f1b423d82724aa65ad2766542b3d6f18a150389f196064cd674911164fba3f189bc338d72005ba2e654bf51a8687fea0510a15"}, 0x48, 0xfffffffffffffffb) keyctl$chown(0x4, r0, 0xee01, 0xffffffffffffffff) [ 273.697972][ C1] sd 0:0:1:0: [sg0] tag#8114 CDB[20]: ba [ 273.703918][T27096] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x5452, 0x0) 00:34:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x4b49, 0x0) [ 273.807808][T27118] loop4: detected capacity change from 0 to 11 00:34:11 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x0, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:11 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x4}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:11 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x20c000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x5, 0x0, 0x0) 00:34:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 274.186092][ C0] sd 0:0:1:0: [sg0] tag#8115 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 274.196493][ C0] sd 0:0:1:0: [sg0] tag#8115 CDB: opcode=0xe5 (vendor) [ 274.203406][ C0] sd 0:0:1:0: [sg0] tag#8115 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 274.203431][ C0] sd 0:0:1:0: [sg0] tag#8115 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 00:34:12 executing program 1: fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) [ 274.203445][ C0] sd 0:0:1:0: [sg0] tag#8115 CDB[20]: ba [ 274.220851][T27142] loop4: detected capacity change from 0 to 11 [ 274.265416][T27154] loop4: detected capacity change from 0 to 11 00:34:12 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:12 executing program 1: r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r0, 0x7, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @dev}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x38}}, 0x0) 00:34:12 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x5}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:12 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x20d000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, &(0x7f00000086c0)="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", 0xb80, 0x0, &(0x7f00000096c0)={0xa, 0x4e21, 0x0, @mcast1, 0x4}, 0x1c) [ 274.670508][T27175] loop4: detected capacity change from 0 to 11 [ 274.671493][ C1] sd 0:0:1:0: [sg0] tag#8116 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 274.671519][ C1] sd 0:0:1:0: [sg0] tag#8116 CDB: opcode=0xe5 (vendor) 00:34:12 executing program 1: clock_gettime(0x9, &(0x7f0000000280)) [ 274.671559][ C1] sd 0:0:1:0: [sg0] tag#8116 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 274.671578][ C1] sd 0:0:1:0: [sg0] tag#8116 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 274.671601][ C1] sd 0:0:1:0: [sg0] tag#8116 CDB[20]: ba [ 274.713108][T27187] loop4: detected capacity change from 0 to 11 00:34:12 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:12 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x6}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x43, 0x0, &(0x7f0000000040)) 00:34:12 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x20e000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:12 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:34:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB='('], 0x128}}, 0x0) [ 275.110913][ C0] sd 0:0:1:0: [sg0] tag#8117 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 275.110941][ C0] sd 0:0:1:0: [sg0] tag#8117 CDB: opcode=0xe5 (vendor) [ 275.110962][ C0] sd 0:0:1:0: [sg0] tag#8117 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 275.110979][ C0] sd 0:0:1:0: [sg0] tag#8117 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 275.110994][ C0] sd 0:0:1:0: [sg0] tag#8117 CDB[20]: ba [ 275.142464][T27214] loop4: detected capacity change from 0 to 11 [ 275.220982][T27226] loop4: detected capacity change from 0 to 11 00:34:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000009c0)={&(0x7f00000001c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x27}}}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000029"], 0x18}, 0x0) 00:34:13 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:13 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x20f000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:13 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:13 executing program 1: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x40) 00:34:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x40086602, 0x0) [ 275.631488][T27240] loop4: detected capacity change from 0 to 11 [ 275.682176][T27248] loop4: detected capacity change from 0 to 11 00:34:13 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:13 executing program 1: syz_open_dev$vcsu(&(0x7f0000001980), 0x0, 0x0) 00:34:13 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x8}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:13 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x210000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 276.045253][ C1] scsi_io_completion_action: 1 callbacks suppressed [ 276.045279][ C1] sd 0:0:1:0: [sg0] tag#8119 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 276.045303][ C1] sd 0:0:1:0: [sg0] tag#8119 CDB: opcode=0xe5 (vendor) [ 276.045324][ C1] sd 0:0:1:0: [sg0] tag#8119 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 276.045348][ C1] sd 0:0:1:0: [sg0] tag#8119 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 276.045370][ C1] sd 0:0:1:0: [sg0] tag#8119 CDB[20]: ba 00:34:13 executing program 1: syz_open_dev$vcsu(&(0x7f0000000440), 0x0, 0xc2) 00:34:13 executing program 1: io_setup(0x8000, &(0x7f0000000080)=0x0) io_destroy(r0) [ 276.045649][T27275] loop4: detected capacity change from 0 to 11 [ 276.109664][T27275] EXT4-fs: 9 callbacks suppressed [ 276.109676][T27275] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000040)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x20000894) 00:34:14 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x211000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 276.189685][T27289] loop4: detected capacity change from 0 to 11 [ 276.211793][T27289] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:14 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:14 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x9}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:14 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x212000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 276.596682][ C1] sd 0:0:1:0: [sg0] tag#8120 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 276.596704][ C1] sd 0:0:1:0: [sg0] tag#8120 CDB: opcode=0xe5 (vendor) [ 276.596732][ C1] sd 0:0:1:0: [sg0] tag#8120 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 276.596749][ C1] sd 0:0:1:0: [sg0] tag#8120 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 276.596786][ C1] sd 0:0:1:0: [sg0] tag#8120 CDB[20]: ba [ 276.599465][T27317] loop4: detected capacity change from 0 to 11 [ 276.647367][T27317] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 276.691572][T27323] loop4: detected capacity change from 0 to 11 [ 276.692452][T27323] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:14 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:34:14 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x213000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:14 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xa}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) 00:34:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 276.985917][T27339] loop4: detected capacity change from 0 to 11 [ 276.987769][T27339] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 277.003271][ C1] sd 0:0:1:0: [sg0] tag#8121 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 277.003299][ C1] sd 0:0:1:0: [sg0] tag#8121 CDB: opcode=0xe5 (vendor) 00:34:14 executing program 1: socket$inet_udp(0xa, 0x2, 0x0) 00:34:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 277.003316][ C1] sd 0:0:1:0: [sg0] tag#8121 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 277.003333][ C1] sd 0:0:1:0: [sg0] tag#8121 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 00:34:14 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xb}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 277.003353][ C1] sd 0:0:1:0: [sg0] tag#8121 CDB[20]: ba [ 277.072288][T27355] loop4: detected capacity change from 0 to 11 [ 277.072681][T27355] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 277.183138][T27371] loop4: detected capacity change from 0 to 11 [ 277.189817][T27371] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:15 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/block/loop0', 0x42, 0x0) 00:34:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x214000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:15 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 277.558593][ C0] sd 0:0:1:0: [sg0] tag#8087 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 277.558618][ C0] sd 0:0:1:0: [sg0] tag#8087 CDB: opcode=0xe5 (vendor) [ 277.558637][ C0] sd 0:0:1:0: [sg0] tag#8087 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 277.585826][ C0] sd 0:0:1:0: [sg0] tag#8087 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 277.585862][ C0] sd 0:0:1:0: [sg0] tag#8087 CDB[20]: ba 00:34:15 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xc}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:15 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100)={[0x6]}, 0x8}) 00:34:15 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "", ['\x00', '\x00', '\x00']}, 0x3b0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x215000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 277.916451][T27401] loop4: detected capacity change from 0 to 11 [ 277.925179][T27401] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 277.930032][ C1] sd 0:0:1:0: [sg0] tag#8088 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 277.948325][ C1] sd 0:0:1:0: [sg0] tag#8088 CDB: opcode=0xe5 (vendor) [ 277.948344][ C1] sd 0:0:1:0: [sg0] tag#8088 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:34:15 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xd}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 277.948380][ C1] sd 0:0:1:0: [sg0] tag#8088 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 277.948397][ C1] sd 0:0:1:0: [sg0] tag#8088 CDB[20]: ba [ 277.982060][T27412] loop4: detected capacity change from 0 to 11 [ 277.982336][T27412] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:34:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x216000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:15 executing program 1: pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RLERROR(r0, &(0x7f00000001c0)={0xb, 0x7, 0x0, {0x2, '^['}}, 0xffffff24) write$P9_RLERRORu(r0, &(0x7f00000000c0)={0xf, 0x7, 0x0, {{0x2, '^['}}}, 0xf) [ 278.050616][T27418] loop4: detected capacity change from 0 to 11 [ 278.065404][T27418] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:15 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xe}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 278.165052][T27442] loop4: detected capacity change from 0 to 11 00:34:16 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x217000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 278.206335][T27447] loop4: detected capacity change from 0 to 11 00:34:16 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x10}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:16 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x218000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:16 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x800000080004105) [ 278.556555][T27466] loop4: detected capacity change from 0 to 11 [ 278.643734][T27475] loop4: detected capacity change from 0 to 11 00:34:16 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:16 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "", ['\x00', '\x00', '\x00']}, 0x3b0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:16 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x11}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:16 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x219000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:16 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0x0) sendfile(r0, r1, 0x0, 0x800000080004105) [ 278.891579][ C1] sd 0:0:1:0: [sg0] tag#8089 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 278.894947][T27489] loop4: detected capacity change from 0 to 11 [ 278.901989][ C1] sd 0:0:1:0: [sg0] tag#8089 CDB: opcode=0xe5 (vendor) [ 278.902010][ C1] sd 0:0:1:0: [sg0] tag#8089 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 278.924595][ C1] sd 0:0:1:0: [sg0] tag#8089 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 278.934307][ C1] sd 0:0:1:0: [sg0] tag#8089 CDB[20]: ba 00:34:16 executing program 1: socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) [ 278.939326][ C0] sd 0:0:1:0: [sg0] tag#8090 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 278.950332][ C0] sd 0:0:1:0: [sg0] tag#8090 CDB: opcode=0xe5 (vendor) [ 278.957339][ C0] sd 0:0:1:0: [sg0] tag#8090 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 278.957359][ C0] sd 0:0:1:0: [sg0] tag#8090 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 278.957377][ C0] sd 0:0:1:0: [sg0] tag#8090 CDB[20]: ba 00:34:16 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') 00:34:16 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x21a000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:16 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x12}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 279.025461][T27507] loop4: detected capacity change from 0 to 11 00:34:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x55633f7022c753a8) 00:34:16 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000080)={[0x8000]}, 0x8) [ 279.087456][T27521] loop4: detected capacity change from 0 to 11 00:34:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fork() sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32=r1], 0xa0}, 0x0) [ 279.149069][T27532] loop4: detected capacity change from 0 to 11 00:34:17 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x21b000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:17 executing program 1: io_setup(0x200, &(0x7f0000000180)=0x0) io_getevents(r0, 0x8001, 0x0, 0x0, 0x0) 00:34:17 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x22}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:17 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0x0) sendfile(r0, r1, 0x0, 0x800000080004105) 00:34:17 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "", ['\x00', '\x00', '\x00']}, 0x3b0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:17 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 279.766917][T27566] loop4: detected capacity change from 0 to 11 [ 279.773517][ C1] sd 0:0:1:0: [sg0] tag#8091 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 279.773542][ C1] sd 0:0:1:0: [sg0] tag#8091 CDB: opcode=0xe5 (vendor) [ 279.773561][ C1] sd 0:0:1:0: [sg0] tag#8091 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 279.773579][ C1] sd 0:0:1:0: [sg0] tag#8091 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 00:34:17 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0x0) sendfile(r0, r1, 0x0, 0x800000080004105) [ 279.773594][ C1] sd 0:0:1:0: [sg0] tag#8091 CDB[20]: ba [ 279.784452][ C1] sd 0:0:1:0: [sg0] tag#8092 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 279.828548][ C1] sd 0:0:1:0: [sg0] tag#8092 CDB: opcode=0xe5 (vendor) [ 279.828588][ C1] sd 0:0:1:0: [sg0] tag#8092 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 279.828604][ C1] sd 0:0:1:0: [sg0] tag#8092 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 279.828620][ C1] sd 0:0:1:0: [sg0] tag#8092 CDB[20]: ba 00:34:17 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x21c000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:17 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x25}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:17 executing program 1: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x539380) [ 279.939034][T27582] loop4: detected capacity change from 0 to 11 00:34:17 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000200)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/94}, {&(0x7f00000000c0)=""/93}, {&(0x7f0000000140)=""/58}], 0x10, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='syz', 0x0) 00:34:17 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) socket(0x29, 0x0, 0x0) [ 280.016682][T27594] loop4: detected capacity change from 0 to 11 [ 280.083505][T27610] loop4: detected capacity change from 0 to 11 00:34:18 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6, r8}, {r7}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:18 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x21d000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:18 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x2e}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='cdg\x00', 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x900}, 0x1c) 00:34:18 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484", ['\x00', '\x00', '\x00']}, 0x3be) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:18 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r0, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004105) [ 280.667432][T27625] loop4: detected capacity change from 0 to 11 [ 280.683999][ C1] sd 0:0:1:0: [sg0] tag#8093 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 280.694390][ C1] sd 0:0:1:0: [sg0] tag#8093 CDB: opcode=0xe5 (vendor) [ 280.701380][ C1] sd 0:0:1:0: [sg0] tag#8093 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:34:18 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r0, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004105) 00:34:18 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r0, 0x4, 0xc0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004105) 00:34:18 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004105) [ 280.711035][ C1] sd 0:0:1:0: [sg0] tag#8093 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 280.720615][ C1] sd 0:0:1:0: [sg0] tag#8093 CDB[20]: ba 00:34:18 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x300}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:18 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004105) [ 280.787376][T27651] loop4: detected capacity change from 0 to 11 00:34:18 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004105) [ 280.867838][T27663] loop4: detected capacity change from 0 to 11 [ 280.903051][T27670] loop4: detected capacity change from 0 to 11 00:34:19 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x500}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:19 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x21e000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x0) 00:34:19 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484", ['\x00', '\x00', '\x00']}, 0x3be) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:19 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:19 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000440)='N\x81\x1f\x81/\x04csa#\x00\x7fW8\xf0\x8aI\xbc|\x8a\\]\xb2#\x11\x92=\x80\xf1\xe5\x87\x16\xfc\xa6\xe7\xcfe<\xc4\xf4\x92\x0f\xe0eIB\xc4m\xd7:\xf5\xdb\x84\x8b\xb6\xa5\x8a\xf8\x86i\x7f|\xd4\xc5\xa5?\xe5\x18\x1fx\xce\xc2\xfa\x9a\xb9\x7f\x89\t\r\x8f\x9c\xab\xee\xae\xb3\xc2\x97\xec\x1e\x15\xbe\x96\xb9\rnZ\xe7f\x8a\x9a\xb8\x0f\xae\x01)\xae\xa6\x1b#\x00\x95\xefF\xf0N\xbcO\xcc\xe3\x05G\xe9\xf8e\xf3]b\x9267\xd7 \xe4<\xd4\x06\xc4)J\x82\x9dp\xe7\xa7Y\xc4\x04P\xecee\xach/\xd8O\x82b\xae\x1a\xef\xf4ZL/sh\x066 \x96\x11\xd3}*\xd0m\x80\xe8\xc4\x8b\x90~i\xe1t\xef\x89k\xe4\xdam\xe1 \x15Bm\xe8\xa5\xe1\x8e\x8f\xab\x8c\x97\xa2l\xc0t0\x96&\x16\xd0\xc2\xeeI\x7f \xb7\xc6\xee\xb6<-zy:\xb6\x87\x941\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\v\xed\xde\xfai\xeb\xab\x1e\xbd\xb5\xc2W*A!\x00\xdc\xcb\xf6r\x89\xc5\x7f\xc7C#\x06\xa0f\x97\xf58zkm\xfc\xf9I\xbc\x16\xcc\xe3\nV\"\xfdmK\x11\xdc\xd4\xa2\xd8\x1e\xd2u\x1bo\xf3\xf5\xcc\xb0U\xb4\"\x19\xfc\xce\xc8') [ 281.633951][ C1] scsi_io_completion_action: 1 callbacks suppressed [ 281.633986][ C1] sd 0:0:1:0: [sg0] tag#8095 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 281.641355][T27696] loop4: detected capacity change from 0 to 11 [ 281.650980][ C1] sd 0:0:1:0: [sg0] tag#8095 CDB: opcode=0xe5 (vendor) [ 281.663991][ C1] sd 0:0:1:0: [sg0] tag#8095 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 281.667065][T27696] EXT4-fs: 16 callbacks suppressed 00:34:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x0) [ 281.667077][T27696] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 281.673569][ C1] sd 0:0:1:0: [sg0] tag#8095 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 281.673608][ C1] sd 0:0:1:0: [sg0] tag#8095 CDB[20]: ba [ 281.701961][ C0] sd 0:0:1:0: [sg0] tag#8096 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 281.713462][ C0] sd 0:0:1:0: [sg0] tag#8096 CDB: opcode=0xe5 (vendor) [ 281.713480][ C0] sd 0:0:1:0: [sg0] tag#8096 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:34:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') fcntl$setstatus(r1, 0x4, 0xc0000) sendfile(r0, r1, 0x0, 0x0) [ 281.713497][ C0] sd 0:0:1:0: [sg0] tag#8096 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 281.713514][ C0] sd 0:0:1:0: [sg0] tag#8096 CDB[20]: ba 00:34:19 executing program 1: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 00:34:19 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002940)={0x0, 0x0, 0x0}, 0x0) 00:34:19 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x21f000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:19 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x600}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 281.814407][T27712] loop4: detected capacity change from 0 to 11 [ 281.837730][T27712] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:19 executing program 0: syz_io_uring_setup(0x2c12, &(0x7f0000002c40), &(0x7f0000b7e000/0x4000)=nil, &(0x7f0000ec3000/0x4000)=nil, &(0x7f0000002cc0), &(0x7f0000002d00)) 00:34:19 executing program 1: mq_open(&(0x7f0000000080)=')\xab\x00', 0x40, 0x0, &(0x7f00000000c0)) [ 281.901352][T27734] loop4: detected capacity change from 0 to 11 [ 281.909292][T27734] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:19 executing program 1: socketpair$unix(0x1, 0x2ebdb3545271ce1d, 0x0, 0x0) [ 281.992588][T27750] loop4: detected capacity change from 0 to 11 [ 282.015149][T27750] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:20 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484", ['\x00', '\x00', '\x00']}, 0x3be) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 282.345717][ C0] sd 0:0:1:0: [sg0] tag#8104 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 282.345752][ C0] sd 0:0:1:0: [sg0] tag#8104 CDB: opcode=0xe5 (vendor) [ 282.345769][ C0] sd 0:0:1:0: [sg0] tag#8104 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 282.345787][ C0] sd 0:0:1:0: [sg0] tag#8104 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 282.345806][ C0] sd 0:0:1:0: [sg0] tag#8104 CDB[20]: ba 00:34:20 executing program 1: r0 = mq_open(&(0x7f0000000000)='{$+(].!*(%\')[\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) 00:34:20 executing program 0: shmctl$SHM_LOCK(0xffffffffffffffff, 0xb) getpgid(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000300), 0x6e, &(0x7f0000001600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000001640)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18}}], 0x4c}, 0x40) openat$sysfs(0xffffff9c, &(0x7f0000001780)='/sys/block/loop0', 0x204000, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002e40)={&(0x7f00000017c0), 0x6e, &(0x7f0000002d40)=[{0x0}, {0x0}, {&(0x7f0000002b00)=""/193, 0xc1}, {0x0}], 0x4}, 0x0) shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffb000/0x3000)=nil) socket(0xf, 0x5, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000003300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000032c0)=[@cred={{0x18, 0x1, 0x2, {0x0}}}], 0x18}, 0x0) syz_open_procfs$userns(r1, &(0x7f0000003340)) shmget(0x3, 0x3000, 0x100, &(0x7f0000ffc000/0x3000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) syz_io_uring_setup(0x20f6, &(0x7f0000003400)={0x0, 0xce1f, 0x1, 0x2, 0x33}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000003480), &(0x7f00000034c0)) shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffc000/0x1000)=nil) 00:34:20 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x220000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:20 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x700}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:20 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:20 executing program 1: getpgid(0xffffffffffffffff) syz_open_procfs$userns(0x0, &(0x7f0000003340)) [ 282.661175][T27775] loop4: detected capacity change from 0 to 11 [ 282.661643][T27775] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 282.667240][ C1] sd 0:0:1:0: [sg0] tag#8105 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 282.687440][ C1] sd 0:0:1:0: [sg0] tag#8105 CDB: opcode=0xe5 (vendor) 00:34:20 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$sock_linger(r0, 0x1, 0x31, 0x0, &(0x7f00000008c0)) [ 282.687459][ C1] sd 0:0:1:0: [sg0] tag#8105 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 282.687494][ C1] sd 0:0:1:0: [sg0] tag#8105 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 282.687513][ C1] sd 0:0:1:0: [sg0] tag#8105 CDB[20]: ba [ 282.736483][T27790] loop4: detected capacity change from 0 to 11 00:34:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='T'], 0x50}}, 0x0) 00:34:20 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003bc0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) [ 282.765767][T27790] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:20 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x900}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000008340)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) [ 282.897569][T27812] loop4: detected capacity change from 0 to 11 [ 282.897922][T27812] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 282.974780][T27820] loop4: detected capacity change from 0 to 11 [ 282.975959][T27820] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:21 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f053", ['\x00', '\x00', '\x00']}, 0x3c5) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:21 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$sock_linger(r0, 0x1, 0x45, 0x0, &(0x7f00000008c0)) 00:34:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x221000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:21 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$sock_linger(r0, 0x1, 0x10, 0x0, &(0x7f00000008c0)) 00:34:21 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xa00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 283.234587][ C1] sd 0:0:1:0: [sg0] tag#8106 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 283.234614][ C1] sd 0:0:1:0: [sg0] tag#8106 CDB: opcode=0xe5 (vendor) [ 283.234632][ C1] sd 0:0:1:0: [sg0] tag#8106 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 283.234651][ C1] sd 0:0:1:0: [sg0] tag#8106 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 283.234669][ C1] sd 0:0:1:0: [sg0] tag#8106 CDB[20]: ba [ 283.240648][T27834] loop4: detected capacity change from 0 to 11 [ 283.341327][T27834] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 283.397317][T27848] loop4: detected capacity change from 0 to 11 [ 283.410607][T27848] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:21 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') 00:34:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001b00)) 00:34:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x222000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:21 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:21 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xb00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8970, &(0x7f0000001d80)={'sit0\x00', 0x0}) 00:34:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000800)={'wpan3\x00'}) [ 283.681972][T27865] loop4: detected capacity change from 0 to 11 [ 283.700972][ C1] sd 0:0:1:0: [sg0] tag#8107 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 283.711374][ C1] sd 0:0:1:0: [sg0] tag#8107 CDB: opcode=0xe5 (vendor) [ 283.711394][ C1] sd 0:0:1:0: [sg0] tag#8107 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 283.711416][ C1] sd 0:0:1:0: [sg0] tag#8107 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 283.711435][ C1] sd 0:0:1:0: [sg0] tag#8107 CDB[20]: ba [ 283.753994][T27878] loop4: detected capacity change from 0 to 11 00:34:21 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f053", ['\x00', '\x00', '\x00']}, 0x3c5) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@mcast1, 0x0, 0x1, 0x0, 0xf}, 0x20) 00:34:21 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$sock_linger(r0, 0x1, 0x3b, 0x0, &(0x7f00000008c0)) 00:34:21 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xc00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x223000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000002c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @ipv4, 0x7800}}) [ 284.158645][T27907] loop4: detected capacity change from 0 to 12 [ 284.176274][ C0] sd 0:0:1:0: [sg0] tag#8108 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 284.176303][ C0] sd 0:0:1:0: [sg0] tag#8108 CDB: opcode=0xe5 (vendor) [ 284.176319][ C0] sd 0:0:1:0: [sg0] tag#8108 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 284.176336][ C0] sd 0:0:1:0: [sg0] tag#8108 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 284.176351][ C0] sd 0:0:1:0: [sg0] tag#8108 CDB[20]: ba [ 284.222193][T27919] loop4: detected capacity change from 0 to 12 00:34:22 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:22 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$sock_linger(r0, 0x1, 0x3, 0x0, &(0x7f00000008c0)) 00:34:22 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$sock_linger(r0, 0x1, 0x24, 0x0, &(0x7f00000008c0)) 00:34:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x224000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:22 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xd00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:22 executing program 0: socket$inet(0x2, 0x3, 0x40000) [ 284.631824][T27938] loop4: detected capacity change from 0 to 13 [ 284.665087][ C1] sd 0:0:1:0: [sg0] tag#8109 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 284.665110][ C1] sd 0:0:1:0: [sg0] tag#8109 CDB: opcode=0xe5 (vendor) [ 284.665127][ C1] sd 0:0:1:0: [sg0] tag#8109 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 284.665146][ C1] sd 0:0:1:0: [sg0] tag#8109 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 284.701552][ C1] sd 0:0:1:0: [sg0] tag#8109 CDB[20]: ba [ 284.725184][T27951] loop4: detected capacity change from 0 to 13 00:34:22 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f053", ['\x00', '\x00', '\x00']}, 0x3c5) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:22 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=[@cred={{0x18, 0x1, 0x2, {0xffffffffffffffff}}}], 0x18}, 0x0) 00:34:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x891e, &(0x7f0000001d80)={'sit0\x00', 0x0}) 00:34:22 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xe00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x225000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000002340)={0x18, 0x13, 0x15, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x18}], 0x1}, 0x0) [ 285.072716][T27967] loop4: detected capacity change from 0 to 14 [ 285.094028][ C1] sd 0:0:1:0: [sg0] tag#8110 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 285.104428][ C1] sd 0:0:1:0: [sg0] tag#8110 CDB: opcode=0xe5 (vendor) [ 285.111579][ C1] sd 0:0:1:0: [sg0] tag#8110 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 285.121504][ C1] sd 0:0:1:0: [sg0] tag#8110 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 285.131162][ C1] sd 0:0:1:0: [sg0] tag#8110 CDB[20]: ba [ 285.195380][T27982] loop4: detected capacity change from 0 to 14 00:34:23 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x226000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:23 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x541b, &(0x7f0000000040)={'wg1\x00'}) 00:34:23 executing program 0: socketpair(0x11, 0x8000a, 0x0, &(0x7f0000000000)) 00:34:23 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x1100}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:23 executing program 1: rt_sigprocmask(0x1, &(0x7f0000001140), 0x0, 0x8) [ 285.593703][T27999] loop4: detected capacity change from 0 to 17 [ 285.605823][ C1] sd 0:0:1:0: [sg0] tag#8111 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 285.605850][ C1] sd 0:0:1:0: [sg0] tag#8111 CDB: opcode=0xe5 (vendor) [ 285.605867][ C1] sd 0:0:1:0: [sg0] tag#8111 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 285.605900][ C1] sd 0:0:1:0: [sg0] tag#8111 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 285.605919][ C1] sd 0:0:1:0: [sg0] tag#8111 CDB[20]: ba [ 285.649729][T28013] loop4: detected capacity change from 0 to 17 00:34:23 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84", ['\x00', '\x00', '\x00']}, 0x3c9) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:23 executing program 1: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000040)={0x100001, 0x100074}, 0x20) 00:34:23 executing program 0: socket(0x25, 0x5, 0xfffffff9) 00:34:23 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x1200}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x227000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:23 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup/syz1\x00', 0x200002, 0x0) [ 286.021198][T28033] loop4: detected capacity change from 0 to 18 [ 286.079518][T28048] loop4: detected capacity change from 0 to 18 00:34:24 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {0x0, r8}, {r6}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:24 executing program 0: add_key$user(&(0x7f0000000580), 0x0, &(0x7f0000000800)="9b", 0x1, 0xffffffffffffffff) 00:34:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x11, 0x0, &(0x7f00000005c0)) 00:34:24 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x2200}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:24 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x228000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:24 executing program 1: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0xc7b]}, 0x8}) [ 286.514596][T28067] loop4: detected capacity change from 0 to 34 [ 286.579690][T28079] loop4: detected capacity change from 0 to 34 00:34:24 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84", ['\x00', '\x00', '\x00']}, 0x3c9) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f00000035c0)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80, 0x0}}], 0x1, 0x20000000) 00:34:24 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x2500}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:24 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x229000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:24 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) [ 286.912093][T28096] loop4: detected capacity change from 0 to 37 [ 286.913575][T28096] EXT4-fs: 14 callbacks suppressed [ 286.913636][T28096] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 286.917418][ C1] scsi_io_completion_action: 2 callbacks suppressed [ 286.917447][ C1] sd 0:0:1:0: [sg0] tag#8114 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 286.951886][ C1] sd 0:0:1:0: [sg0] tag#8114 CDB: opcode=0xe5 (vendor) 00:34:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000008180)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f00000013c0)=[@hopopts_2292={{0x18}}, @tclass={{0x14}}], 0x30}}], 0x1, 0x0) [ 286.951923][ C1] sd 0:0:1:0: [sg0] tag#8114 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 286.951943][ C1] sd 0:0:1:0: [sg0] tag#8114 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 286.951959][ C1] sd 0:0:1:0: [sg0] tag#8114 CDB[20]: ba [ 286.991977][T28106] loop4: detected capacity change from 0 to 37 [ 286.992249][T28106] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 00:34:25 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x2e00}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:25 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:25 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x22a000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:25 executing program 1: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x7000) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x4000) 00:34:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 287.454283][ C1] sd 0:0:1:0: [sg0] tag#8116 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 287.454307][ C1] sd 0:0:1:0: [sg0] tag#8116 CDB: opcode=0xe5 (vendor) [ 287.454328][ C1] sd 0:0:1:0: [sg0] tag#8116 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 287.454348][ C1] sd 0:0:1:0: [sg0] tag#8116 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 287.454367][ C1] sd 0:0:1:0: [sg0] tag#8116 CDB[20]: ba [ 287.471499][T28127] loop4: detected capacity change from 0 to 46 [ 287.471892][T28127] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 287.538977][T28144] loop4: detected capacity change from 0 to 46 [ 287.540620][T28144] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:25 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84", ['\x00', '\x00', '\x00']}, 0x3c9) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:25 executing program 0: getresuid(&(0x7f0000000040), &(0x7f0000001300), &(0x7f0000001340)) 00:34:25 executing program 1: request_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff8) 00:34:25 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x4000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:25 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x22b000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0xffff, 0x100c, &(0x7f0000000180), 0x10) 00:34:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0xffff, 0x100c, &(0x7f0000000180)={0x13}, 0x10) [ 287.892325][T28164] loop4: detected capacity change from 0 to 64 [ 287.894183][T28164] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 287.897469][ C0] sd 0:0:1:0: [sg0] tag#8117 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 287.897496][ C0] sd 0:0:1:0: [sg0] tag#8117 CDB: opcode=0xe5 (vendor) 00:34:25 executing program 0: socketpair(0x23, 0x0, 0x81, 0x0) [ 287.897516][ C0] sd 0:0:1:0: [sg0] tag#8117 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 287.897535][ C0] sd 0:0:1:0: [sg0] tag#8117 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 287.897553][ C0] sd 0:0:1:0: [sg0] tag#8117 CDB[20]: ba [ 287.952113][T28176] loop4: detected capacity change from 0 to 64 [ 287.952362][T28176] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:26 executing program 0: open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) 00:34:26 executing program 1: socketpair(0x39, 0x0, 0x0, 0x0) 00:34:26 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x80000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:26 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x22c000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 288.397186][T28198] loop4: detected capacity change from 0 to 2048 [ 288.397588][T28198] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 288.461047][T28207] loop4: detected capacity change from 0 to 2048 [ 288.467661][T28207] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:26 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7c", ['\x00', '\x00', '\x00']}, 0x3cb) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:26 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:26 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "1dd823b2930e590a65c5e79fbeb62933b6d86544da15e720af1518d6552e50eb61cd8eda9a7d5618b50bc41fdac9e265fb4b5021570c68c0d3f1e23ee74dc02a"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, &(0x7f00000002c0)="e2", 0x1) 00:34:26 executing program 0: setsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x0, &(0x7f0000001900), 0x10) 00:34:26 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x400000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:26 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x22d000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:26 executing program 0: r0 = fsopen(&(0x7f00000001c0)='overlay\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='lazytime\x00', 0x0, 0x0) 00:34:26 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x88000, 0x0) [ 288.788184][ C0] sd 0:0:1:0: [sg0] tag#8118 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 288.798684][ C0] sd 0:0:1:0: [sg0] tag#8118 CDB: opcode=0xe5 (vendor) [ 288.805616][ C0] sd 0:0:1:0: [sg0] tag#8118 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 288.809297][T28229] loop4: detected capacity change from 0 to 16384 [ 288.815199][ C0] sd 0:0:1:0: [sg0] tag#8118 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 288.831251][ C0] sd 0:0:1:0: [sg0] tag#8118 CDB[20]: ba [ 288.854375][T28229] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 288.871764][ C0] sd 0:0:1:0: [sg0] tag#8119 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 288.871788][ C0] sd 0:0:1:0: [sg0] tag#8119 CDB: opcode=0xe5 (vendor) [ 288.888996][ C0] sd 0:0:1:0: [sg0] tag#8119 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 00:34:26 executing program 1: syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) fork() getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 00:34:26 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x22e000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:26 executing program 0: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, &(0x7f0000000040)) [ 288.898578][ C0] sd 0:0:1:0: [sg0] tag#8119 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 288.898600][ C0] sd 0:0:1:0: [sg0] tag#8119 CDB[20]: ba 00:34:26 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x1000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 289.037613][T28261] loop4: detected capacity change from 0 to 65536 [ 289.038034][T28261] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 289.108029][T28269] loop4: detected capacity change from 0 to 65536 00:34:27 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7c", ['\x00', '\x00', '\x00']}, 0x3cb) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 289.415144][ C1] sd 0:0:1:0: [sg0] tag#8120 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 289.415169][ C1] sd 0:0:1:0: [sg0] tag#8120 CDB: opcode=0xe5 (vendor) [ 289.415200][ C1] sd 0:0:1:0: [sg0] tag#8120 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 289.415220][ C1] sd 0:0:1:0: [sg0] tag#8120 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 289.452945][ C1] sd 0:0:1:0: [sg0] tag#8120 CDB[20]: ba 00:34:27 executing program 1: syz_open_dev$loop(&(0x7f0000004c80), 0x0, 0x80800) 00:34:27 executing program 0: fspick(0xffffffffffffffff, &(0x7f0000002380)='\x00', 0x0) 00:34:27 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x22f000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:27 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6}, {}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:27 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x2000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:27 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x14, 0x201, 0x0, 0x0, {0x23, 0x1}}, 0x14}}, 0x0) 00:34:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x6, &(0x7f0000000000)="0236957d", 0x4) [ 289.780535][T28289] loop4: detected capacity change from 0 to 131072 [ 289.787558][ C0] sd 0:0:1:0: [sg0] tag#8121 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 289.787586][ C0] sd 0:0:1:0: [sg0] tag#8121 CDB: opcode=0xe5 (vendor) 00:34:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8263, 0x0) vmsplice(r0, &(0x7f0000001500)=[{0x0}], 0x1, 0x0) 00:34:27 executing program 0: getgroups(0x1, &(0x7f0000001440)=[0xffffffffffffffff]) [ 289.787603][ C0] sd 0:0:1:0: [sg0] tag#8121 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 289.787647][ C0] sd 0:0:1:0: [sg0] tag#8121 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 289.787666][ C0] sd 0:0:1:0: [sg0] tag#8121 CDB[20]: ba 00:34:27 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x3000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:27 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getpeername(r0, 0x0, &(0x7f0000000180)) [ 289.841969][T28303] loop4: detected capacity change from 0 to 131072 [ 289.985345][T28319] loop4: detected capacity change from 0 to 196608 [ 290.014143][T28329] loop4: detected capacity change from 0 to 196608 00:34:28 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7c", ['\x00', '\x00', '\x00']}, 0x3cb) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:28 executing program 1: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000100)=""/116) 00:34:28 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 00:34:28 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x230000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 290.324884][ T25] audit: type=1326 audit(1629851668.128:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x50000 [ 290.325437][ T25] audit: type=1326 audit(1629851668.128:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x50000 [ 290.325858][ T25] audit: type=1326 audit(1629851668.128:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x50000 [ 290.326235][ T25] audit: type=1326 audit(1629851668.128:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x50000 [ 290.326525][ T25] audit: type=1326 audit(1629851668.128:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x50000 [ 290.367290][ C0] sd 0:0:1:0: [sg0] tag#8064 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 290.405514][ T25] audit: type=1326 audit(1629851668.208:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x50000 [ 290.429087][ C0] sd 0:0:1:0: [sg0] tag#8064 CDB: opcode=0xe5 (vendor) [ 290.463985][ T25] audit: type=1326 audit(1629851668.208:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x50000 [ 290.495354][ C0] sd 0:0:1:0: [sg0] tag#8064 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 290.510091][ T25] audit: type=1326 audit(1629851668.208:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x50000 [ 290.534458][ C0] sd 0:0:1:0: [sg0] tag#8064 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 290.534484][ C0] sd 0:0:1:0: [sg0] tag#8064 CDB[20]: ba [ 290.544820][ T25] audit: type=1326 audit(1629851668.208:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x50000 [ 290.670487][ T25] audit: type=1326 audit(1629851668.208:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28336 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x50000 [ 290.957713][T28343] ================================================================== [ 290.957742][T28343] BUG: KCSAN: data-race in audit_log_start / skb_queue_tail [ 290.957773][T28343] [ 290.957777][T28343] write to 0xffffffff84180d10 of 4 bytes by task 28336 on cpu 0: [ 290.957792][T28343] skb_queue_tail+0x80/0xa0 [ 290.957811][T28343] audit_log_end+0x171/0x1e0 [ 290.957829][T28343] audit_seccomp+0xd9/0xf0 [ 290.957842][T28343] __seccomp_filter+0xd24/0xf20 [ 290.957859][T28343] __secure_computing+0xfb/0x140 [ 290.957877][T28343] syscall_trace_enter+0x120/0x290 [ 290.957899][T28343] syscall_enter_from_user_mode+0x1c/0x20 [ 290.957924][T28343] do_syscall_64+0x1e/0x90 [ 290.957943][T28343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 290.957965][T28343] [ 290.957969][T28343] read to 0xffffffff84180d10 of 4 bytes by task 28343 on cpu 1: [ 290.957983][T28343] audit_log_start+0x16c/0x670 [ 290.958000][T28343] audit_seccomp+0x45/0xf0 [ 290.958012][T28343] __seccomp_filter+0xd24/0xf20 [ 290.958029][T28343] __secure_computing+0xfb/0x140 [ 290.958047][T28343] syscall_trace_enter+0x120/0x290 [ 290.958068][T28343] syscall_enter_from_user_mode+0x1c/0x20 [ 290.958091][T28343] do_syscall_64+0x1e/0x90 [ 290.958111][T28343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 290.958133][T28343] [ 290.958136][T28343] value changed: 0x00000001 -> 0x00000000 [ 290.958145][T28343] [ 290.958148][T28343] Reported by Kernel Concurrency Sanitizer on: [ 290.958154][T28343] CPU: 1 PID: 28343 Comm: syz-executor.0 Not tainted 5.14.0-rc7-syzkaller #0 [ 290.958174][T28343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.958184][T28343] ================================================================== 00:34:29 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:29 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x5452, &(0x7f0000000000)={"eb0c3a454603b26b5c8f2e55e8a17425"}) 00:34:29 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x4000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:29 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x231000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:29 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00']}, 0x2cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 291.516543][T28363] loop4: detected capacity change from 0 to 262144 [ 291.524434][ C0] sd 0:0:1:0: [sg0] tag#8065 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 291.534835][ C0] sd 0:0:1:0: [sg0] tag#8065 CDB: opcode=0xe5 (vendor) [ 291.541812][ C0] sd 0:0:1:0: [sg0] tag#8065 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 291.551396][ C0] sd 0:0:1:0: [sg0] tag#8065 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 00:34:29 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockname(r0, 0x0, &(0x7f0000000080)) [ 291.563401][ C0] sd 0:0:1:0: [sg0] tag#8065 CDB[20]: ba 00:34:29 executing program 1: openat2$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', &(0x7f0000000080)={0x123c2}, 0x18) 00:34:29 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x5000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 291.661237][ C0] sd 0:0:1:0: [sg0] tag#8066 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 291.671811][ C0] sd 0:0:1:0: [sg0] tag#8066 CDB: opcode=0xe5 (vendor) [ 291.678695][ C0] sd 0:0:1:0: [sg0] tag#8066 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 291.688281][ C0] sd 0:0:1:0: [sg0] tag#8066 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 291.699094][ C0] sd 0:0:1:0: [sg0] tag#8066 CDB[20]: ba 00:34:29 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f053", ['\x00', '\x00', '\x00']}, 0x3c5) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:29 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x232000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 00:34:31 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x6000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:31 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x233000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:31 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:31 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00']}, 0x2cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:31 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00']}, 0x2cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 293.336060][ C1] scsi_io_completion_action: 1 callbacks suppressed [ 293.336085][ C1] sd 0:0:1:0: [sg0] tag#8101 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 293.344837][T28412] loop4: detected capacity change from 0 to 264192 [ 293.353368][ C1] sd 0:0:1:0: [sg0] tag#8101 CDB: opcode=0xe5 (vendor) [ 293.353388][ C1] sd 0:0:1:0: [sg0] tag#8101 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 293.366047][ C0] sd 0:0:1:0: [sg0] tag#8102 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 293.367171][ C1] sd 0:0:1:0: [sg0] tag#8101 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 293.377365][ C0] sd 0:0:1:0: [sg0] tag#8102 CDB: opcode=0xe5 (vendor) [ 293.389183][ C1] sd 0:0:1:0: [sg0] tag#8101 CDB[20]: ba [ 293.399175][ C0] sd 0:0:1:0: [sg0] tag#8102 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 293.421667][ C0] sd 0:0:1:0: [sg0] tag#8102 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 293.431246][ C0] sd 0:0:1:0: [sg0] tag#8102 CDB[20]: ba [ 293.457959][T28412] EXT4-fs: 6 callbacks suppressed [ 293.457971][T28412] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:31 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x234000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 293.683924][ C1] sd 0:0:1:0: [sg0] tag#8103 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 293.694509][ C1] sd 0:0:1:0: [sg0] tag#8103 CDB: opcode=0xe5 (vendor) [ 293.694527][ C1] sd 0:0:1:0: [sg0] tag#8103 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 293.694556][ C1] sd 0:0:1:0: [sg0] tag#8103 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 00:34:31 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x7000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:31 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x235000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 293.694572][ C1] sd 0:0:1:0: [sg0] tag#8103 CDB[20]: ba [ 293.765896][T28435] loop4: detected capacity change from 0 to 264192 [ 293.769828][T28435] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:31 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x8000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 293.865447][T28442] loop4: detected capacity change from 0 to 264192 [ 293.868915][T28442] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:31 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x9000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 293.980569][T28451] loop4: detected capacity change from 0 to 264192 [ 294.008388][T28451] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:31 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x236000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 294.105088][T28458] loop4: detected capacity change from 0 to 61440 [ 294.105444][T28458] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 294.230860][T28467] loop4: detected capacity change from 0 to 61440 [ 294.231247][T28467] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 295.330080][ T25] kauditd_printk_skb: 40069 callbacks suppressed [ 295.330096][ T25] audit: type=1326 audit(1629851673.129:40103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28413 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 295.386793][ T25] audit: type=1326 audit(1629851673.139:40104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28413 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 295.436312][ T25] audit: type=1326 audit(1629851673.139:40105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28413 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 295.485342][ T25] audit: type=1326 audit(1629851673.139:40106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28413 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 295.509164][ T25] audit: type=1326 audit(1629851673.139:40107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28413 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 295.533772][ T25] audit: type=1326 audit(1629851673.139:40108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28413 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 295.557872][ T25] audit: type=1326 audit(1629851673.139:40109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28413 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 295.581998][ T25] audit: type=1326 audit(1629851673.139:40110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28413 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 295.606128][ T25] audit: type=1326 audit(1629851673.139:40111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28413 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 295.630367][ T25] audit: type=1326 audit(1629851673.139:40112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28413 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 00:34:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 00:34:34 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x237000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:34 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xa000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:34 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:34 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00']}, 0x2cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:34 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 296.384979][ C1] sd 0:0:1:0: [sg0] tag#8104 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 296.385279][ C0] sd 0:0:1:0: [sg0] tag#8105 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 296.395486][ C1] sd 0:0:1:0: [sg0] tag#8104 CDB: opcode=0xe5 (vendor) [ 296.405810][ C0] sd 0:0:1:0: [sg0] tag#8105 CDB: opcode=0xe5 (vendor) [ 296.412670][ C1] sd 0:0:1:0: [sg0] tag#8104 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 296.419496][ C0] sd 0:0:1:0: [sg0] tag#8105 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 296.429125][ C1] sd 0:0:1:0: [sg0] tag#8104 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 296.429142][ C1] sd 0:0:1:0: [sg0] tag#8104 CDB[20]: ba [ 296.454027][ C0] sd 0:0:1:0: [sg0] tag#8105 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 296.454047][ C0] sd 0:0:1:0: [sg0] tag#8105 CDB[20]: ba [ 296.463810][T28488] loop4: detected capacity change from 0 to 126976 00:34:34 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xb000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 296.464176][T28488] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 296.485659][ C0] sd 0:0:1:0: [sg0] tag#8106 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 296.485688][ C0] sd 0:0:1:0: [sg0] tag#8106 CDB: opcode=0xe5 (vendor) [ 296.485708][ C0] sd 0:0:1:0: [sg0] tag#8106 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 296.485727][ C0] sd 0:0:1:0: [sg0] tag#8106 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 296.485755][ C0] sd 0:0:1:0: [sg0] tag#8106 CDB[20]: ba [ 296.575181][T28499] loop4: detected capacity change from 0 to 192512 [ 296.576590][T28499] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 296.637022][T28499] loop4: detected capacity change from 0 to 192512 [ 296.637234][T28499] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:34 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xc000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:34 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x238000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 296.747085][T28513] loop4: detected capacity change from 0 to 258048 [ 296.747434][T28513] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:34 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xd000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 296.791009][T28519] loop4: detected capacity change from 0 to 258048 00:34:34 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x239000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 296.902902][T28527] loop4: detected capacity change from 0 to 264192 [ 296.981095][T28537] loop4: detected capacity change from 0 to 264192 00:34:34 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0xe000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 297.099198][T28544] loop4: detected capacity change from 0 to 264192 00:34:35 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 297.195910][T28550] loop4: detected capacity change from 0 to 264192 [ 297.285978][ C0] sd 0:0:1:0: [sg0] tag#8107 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 297.296454][ C0] sd 0:0:1:0: [sg0] tag#8107 CDB: opcode=0xe5 (vendor) [ 297.296474][ C0] sd 0:0:1:0: [sg0] tag#8107 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 297.296492][ C0] sd 0:0:1:0: [sg0] tag#8107 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 297.296508][ C0] sd 0:0:1:0: [sg0] tag#8107 CDB[20]: ba 00:34:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 00:34:37 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x23a000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:37 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00']}, 0x2cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x10000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) 00:34:37 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00']}, 0x2cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "e3c252bed3d7f9"}) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) 00:34:37 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x99, 0x1, 0xf, 0x98, 0x0, 0x2, 0x3e, 0x7, 0x3be, 0x40, 0x314, 0x1, 0x81, 0x38, 0x2, 0x3, 0x6, 0x4a11}, [{0x6474e551, 0x3, 0xfffffffffffffeff, 0x14919de1, 0x0, 0x5, 0x5, 0x8}, {0x3, 0x3f3, 0x8, 0x8, 0x8, 0xfffffffffffffff8, 0x80000000, 0x1}], "ec9666de973c3a8676da8fde8484c0b3b19028f05366367d84ac7cf0", ['\x00', '\x00', '\x00']}, 0x3cc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {0x0, r8}, {r7}, {}, {r7, r8}, {}, {}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {}, {r6, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r3}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {r6, r8}, {}, {r6}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r6}, {r6, r8}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {r7, r8}, {}, {r6}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {r6, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {r6}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {r6, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {}, {}, {r6}, {}, {r6}, {r7}, {}, {r6, r8}, {}, {}, {}, {r7}, {0x0, r8}, {r2}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {r6}, {}, {r6}, {0x0, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7}, {r7}, {r6}, {0x0, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b280)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x3, "e3c252bed3d7f9"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7000000) accept$unix(0xffffffffffffffff, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) sendfile(r0, r1, 0x0, 0x800000080004105) symlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000240)=""/40, 0x28}], 0x4, 0x6, 0x0) [ 299.422714][ C1] sd 0:0:1:0: [sg0] tag#8108 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 299.423573][T28574] loop4: detected capacity change from 0 to 264192 [ 299.433139][ C1] sd 0:0:1:0: [sg0] tag#8108 CDB: opcode=0xe5 (vendor) [ 299.446480][ C1] sd 0:0:1:0: [sg0] tag#8108 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 299.451471][ C0] sd 0:0:1:0: [sg0] tag#8109 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 299.456148][ C1] sd 0:0:1:0: [sg0] tag#8108 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 299.466456][ C0] sd 0:0:1:0: [sg0] tag#8109 CDB: opcode=0xe5 (vendor) [ 299.476030][ C1] sd 0:0:1:0: [sg0] tag#8108 CDB[20]: ba [ 299.482925][ C0] sd 0:0:1:0: [sg0] tag#8109 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 299.494440][T28574] EXT4-fs: 5 callbacks suppressed [ 299.494450][T28574] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 299.498200][ C0] sd 0:0:1:0: [sg0] tag#8109 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 299.522079][ C0] sd 0:0:1:0: [sg0] tag#8109 CDB[20]: ba [ 299.533154][ C0] sd 0:0:1:0: [sg0] tag#8110 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 299.543549][ C0] sd 0:0:1:0: [sg0] tag#8110 CDB: opcode=0xe5 (vendor) [ 299.543566][ C0] sd 0:0:1:0: [sg0] tag#8110 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 299.543584][ C0] sd 0:0:1:0: [sg0] tag#8110 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 299.543601][ C0] sd 0:0:1:0: [sg0] tag#8110 CDB[20]: ba [ 299.642291][T28588] loop4: detected capacity change from 0 to 264192 [ 299.642522][T28588] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:37 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x23b000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) 00:34:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x11000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 299.830236][T28601] loop4: detected capacity change from 0 to 57344 [ 299.832157][T28601] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x12000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 299.869829][T28605] loop4: detected capacity change from 0 to 57344 [ 299.870050][T28605] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:37 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x23c000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 299.950904][T28612] loop4: detected capacity change from 0 to 122880 [ 299.981533][T28612] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', 0x0, 0x85003, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000001440)=[{&(0x7f00000001c0)="8cdd8556f98b1b089d3bf7a1ab84e0e106702c4e6795b7fc61277f62e5c65a17eecb7270160b6413a4caf5dfff3d92c01bec34b2dea68da25d960454a7125eb6e8e583bfcec3", 0x46, 0x6}, {0x0, 0x0, 0x22000000}, {0x0}, {&(0x7f00000012c0)}, {&(0x7f0000001340)="ae4d99bcd3564f0566bf235d211931e2a6640227c3feac90fea00c269dcbcb6e2be65641ee8aa49fb513003aed06f7ccc0efae58c1429bffe3655ec4779461cca63ffe5b4fd11aff4ecee7e4db96669ea78685dcaf8bc211da30a91972ad79e72809620491858c941a210005c07de9936a9139aaf148c911bcc5ff1453415c519cac", 0x82, 0xb4a}], 0x5a060, &(0x7f0000001640)={[], [{@obj_type={'obj_type', 0x3d, 'mountinfo\x00'}}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@fowner_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'mountinfo\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) [ 300.019936][T28616] loop4: detected capacity change from 0 to 122880 [ 300.029161][T28616] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 300.107734][T28625] loop4: detected capacity change from 0 to 114688 [ 300.109936][T28625] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value 00:34:38 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r3, &(0x7f00000002c0)=ANY=[], 0x23d000) fcntl$setpipe(r3, 0x407, 0x7000000) close_range(r0, 0xffffffffffffffff, 0x0) [ 300.232300][T28625] loop4: detected capacity change from 0 to 114688 [ 300.232853][T28625] EXT4-fs (sda1): Unrecognized mount option "obj_type=mountinfo" or missing value [ 300.339935][ T25] kauditd_printk_skb: 23828 callbacks suppressed [ 300.339947][ T25] audit: type=1326 audit(1629851678.149:63941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=3 compat=0 ip=0x4193fb code=0x50000 [ 300.381378][ T25] audit: type=1326 audit(1629851678.179:63942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 300.381407][ T25] audit: type=1326 audit(1629851678.179:63943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 300.434176][ T25] audit: type=1326 audit(1629851678.179:63944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 300.458004][ T25] audit: type=1326 audit(1629851678.179:63945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 300.458034][ T25] audit: type=1326 audit(1629851678.179:63946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 300.506096][ T25] audit: type=1326 audit(1629851678.179:63947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 300.540654][ T25] audit: type=1326 audit(1629851678.179:63948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 300.572104][ T25] audit: type=1326 audit(1629851678.179:63949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000 [ 300.572174][ T25] audit: type=1326 audit(1629851678.179:63950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4192cf code=0x50000