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", 0x1000}, {&(0x7f0000004080)="de69bd2d77b30cb1ff7e743e9600637edee921e5959ef978a814f0f36bb6b5ffd648393ab2aafce7f072344f50471b5c1a614a12ee77ce6f4e37e12c3a53ad439b60e567709bc50256bed39dbe774d305eb1fc03eb07e256be5c5aee846abc6ca92e0953735a4dce2711ba9b9d2d4c645e6c765c83b13eb1d7ca859c64622a42ab245f78c697d222c4a4fa2daa92ffeb11d88a9728dc4146cee97c", 0x9b}, {&(0x7f0000004140)="1bf1769bf6dc24122139280719f6392fc602147bb86c019c84b092136272270dfa1a2a923c9f139a352c44502aa0adc212c3633e8f6631b79e08fb397584b13270b41bb58e1eb89270012c8e76ebfde074fe80c67eeb6d714d7922386d12940b46b0fa6ff0f009702d247db01e0aec95195e86f3a7d39c351fa72bb3d1560e0a1393aefa0f600ed38bc2438559db7e7c52909d830d716f3707118da048f2f84c7409a95f003c725e9f7431ce85cb6c9dc2e3315f07844940cc435cb86df14411f1e6b5e53b94dde650", 0xc9}], 0x8, 0x0, 0x0, 0x20000015}}], 0x2, 0x20000010) r8 = dup(r1) setsockopt$inet6_tcp_int(r8, 0x6, 0x11, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000c80), 0x0, 0x40050) 19:31:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5, &(0x7f0000000140)={0x5, &(0x7f0000000000)=[{0x5, 0x0, 0x4, 0x101}, {0x9, 0x8, 0x0, 0x7fffffff}, {0x8000, 0xff, 0x40, 0xffff}, {0x5, 0x1f, 0x3f, 0x7}, {0x2, 0x4, 0x81, 0x1}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000001580)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=@getsadinfo={0x20, 0x23, 0x1, 0x0, 0x0, 0x0, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0x20}}, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:31:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:31:46 executing program 7: syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) [ 542.595850] loop4: detected capacity change from 0 to 512 [ 542.597770] loop6: detected capacity change from 0 to 512 19:31:47 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:31:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:31:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000140)={0x61e, 0x9, 0xfe0, 0x40}, &(0x7f0000000240)) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') setxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='system.advise\x00', &(0x7f0000000300)='\x00', 0x1, 0x2) 19:31:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7d, 0x7}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x8, 0x1, 0x2, 0x6, 0x0, 0x7, 0xc0002, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x7fff, 0x8}, 0x80, 0x9, 0x2e, 0x1, 0x8001, 0x8006, 0x8a81, 0x0, 0x9, 0x0, 0xfffffffffffffffb}, 0x0, 0x3, 0xffffffffffffffff, 0xd7ede9b8d2555a0a) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) write(r0, &(0x7f0000000900)="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", 0x200) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 19:31:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:31:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 542.780991] loop6: detected capacity change from 0 to 512 19:31:47 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:31:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@fat=@nfs}, {@fat=@discard}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', &(0x7f00000000c0), 0x2000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000000), 0x4) write$P9_RREADLINK(r1, &(0x7f0000000140)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) 19:31:47 executing program 7: syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:31:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x5b, 0x1, 0x6, 0x2}, {0x9, 0xce, 0x81}, {0xfff7, 0x1, 0xbd, 0x4}, {0x0, 0x5, 0x6, 0xf8}, {0xade, 0x40, 0x0, 0x7ff}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="7365637572ce8cad41f5dc32"]) [ 542.848786] No source specified [ 542.864943] loop4: detected capacity change from 0 to 512 [ 552.599667] Bluetooth: hci6: command 0x0406 tx timeout 19:31:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="2385114cebe7b5d32e232120"], 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), &(0x7f00000002c0)=@sha1={0x1, "d27ed2c5e64031b2479f7e743a4946c2813b4acc"}, 0x15, 0x1) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) syz_io_uring_setup(0x6ab, &(0x7f0000000240)={0x0, 0x5ea, 0x1, 0x1, 0x3ae}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000080)) 19:31:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:31:58 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:31:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:31:58 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:31:58 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:31:58 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) 19:31:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7d, 0x7}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x8, 0x1, 0x2, 0x6, 0x0, 0x7, 0xc0002, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x7fff, 0x8}, 0x80, 0x9, 0x2e, 0x1, 0x8001, 0x8006, 0x8a81, 0x0, 0x9, 0x0, 0xfffffffffffffffb}, 0x0, 0x3, 0xffffffffffffffff, 0xd7ede9b8d2555a0a) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) write(r0, &(0x7f0000000900)="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", 0x200) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 19:31:58 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) [ 554.008996] loop6: detected capacity change from 0 to 512 19:31:58 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) [ 554.066644] loop4: detected capacity change from 0 to 512 19:31:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:31:58 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 554.239275] loop6: detected capacity change from 0 to 272 [ 554.245351] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 554.247291] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (68 blocks) 19:32:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 564.266337] loop4: detected capacity change from 0 to 512 [ 564.294144] loop6: detected capacity change from 0 to 272 19:32:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)=@known='system.posix_acl_access\x00') removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x3f, 0x9, &(0x7f0000001740)=[{&(0x7f0000000140)="6f4ae6b6b68f8064c95f8291848ee350926ca38e6d9c0b30504629b2f671ed3a6555be447b21c884ea", 0x29, 0xb0}, {&(0x7f0000000240)="a3fd68e11d429b15bbfe3c8431f796a8d5dcde0c6afc37fb7c5b9dfc0fbfca129a11c2130b9608452877177e139114b69c703b1cdaff02d871d46368e54384c04e56a4654d9fbc2cc0b3b2fd77c8f62bbfb1c178ec60b25c992e30339d7054305a3926e506b45f0a7a2e7b4e72791aa4c95a3ffa2147ba0f8e48c190600db99f9495eca2c7e805cf21b05862b487c9e16f13d02f1b10495cdfdf55889d2589b9277684ed2c291075f87a2c21aa1f9e247f2de41f9a122ebe5e30", 0xba, 0xb9f5}, {&(0x7f0000000300)="c98abcdd6d912a4e9e19bd12095947d9be23287f92660717be8c2f33da020acf0e18e37186fde1aff64ad661ff1c0b12497a7e73180216a3ec851d4e7b4645435f055e701fb261357155669b9559967790072b9614482fde3a225f350ee34687652edb29493fb7da05163d6ef3cdbadc9b93efad654ec5cdbb2232ae87ed93d0622ea5b93afccc8ca18a5905eba5e0d625869676465120b854ac5ef8d3678b0bfcd51bd56a19bf774c973b28f5a01f029235bfdf280d988fe2a11dcefced6a96426a1018cc65e3b00034ab6e20422e97a41b10c3bb27dc87e234f3cd8ffc", 0xde, 0xffffffffffffff80}, {&(0x7f0000000400)="79a0f51da381eb93a688c3adb3bfe897c6107cf96137e4ad014fe0ca811b2e4ceaec6f54080984948f58af3bd1b7689dac65f996fd40f352c81ad1091b8180dd86c38d4bfea851bda28ceaa957c72f93f795c84b9c4962ce9385c44b1445682972dea16be6a81955f18ede9f03a3ff9a8a930f07671650c14e3b6b1fdf8517584d850915eb9e64", 0x87, 0x3}, {&(0x7f00000004c0)="23086d72baccdc90d8eb2de1bca2a3d73b003311e0762aa9b518bbc0638f1abe3534bf5c2d566dccc323713a4295b3ca82174ffc813bd6dfd18843f751777267297f415e314cea08abb50bd75e37f7a7212aa4993e8d0918c869991bdbe57b354a2634c0820212868fcd53d0dbc475b99fa47d0ef3a48f07e9478bb3b94707cdd11edbaafb2e4389889ff3b003f228013261b26adad6395c592c6711de288b117c3c068a810441abd16d9a5e7a6093336cef678ed50c662c5b049c24fab15fa41ea6673fea04d0ecd57acd178565d578714e311b14f530", 0xd7, 0x100000000}, {&(0x7f00000005c0)="d8b37f2f7e55a54f87e3e0ad6c4b302df29eb448a51960aff00fe577bbfd85e79cd6e47cb8e317f66d72c3333637698f87195244d4bae8e8a22265ab55d5a5b9", 0x40}, {&(0x7f0000000600)="6fec151d193083417cf3a68925f8c3b00444532b9dd056dde3a9bd39ae31901e1c6737b61e219bb72a412f967fcd251aa4e54748fb84c485bc75dd4cd648c67b9ce92a983ed416e248c1ecb18dc66ea7f35cb553ea4722159572f351dc06c70c1b13e51ca7892361c7441db517d2f0cf628c1ad5b3902b00c1911503d038d6c4a3f39c977829aa8e6fc17c70b2f8a2476f427688ab22368870bb4f245a5b64094c05b324b6fb94e50d2b97475c5d8e86bb7f7b0391c43824bd10385fad", 0xbd, 0x7}, {&(0x7f00000006c0)="dc1b6510548cc2a0ef84875f29e4163b90e93d0399cb9e03addea35a5402b829b681d77e06c4229972c8b78c69b30fffaedd8efe98227eaf1b8f70034bb636a729f6691a0ee2ed0627bc4504d6c5dea4fcb9332641167e39992d5fd901c6938f96bcb0dbf43bf64243c31d2e83c7b7fc678bcf72da32afa2514caab6f28f1229059e279bc0bda8ee2d4c726f31b4a5eafbcdefd4177c8049dfe4343a6a16ceef957ffaec97adc1f0d317dda6dea357dd6e1efb8a8b46867ce763bcf97b1897f133ea87d221ec35ae425e42ef8c0d8cb7735da5dfd995f63df3b40b28d73d9646646f97ef2715385d18ffeb6cf3949167ddfe0261b62c0742428ba0180e5b732c0683ed3a571fc3a239844ed28640d1f5a205a7768c91934d22f4c63231977e75b6f07d716f89322dd8ba45d0b6599edd2367e07b9dad2c62847698a361e481268413b20770e7549ac311bf2ce6bfb3888a1e1caaf2c2621d857d61958cb9a68c1048ea6118dfcbc6dfb28e0eca10ac0a4b93429777cb2073fb27db139cf58beb339ef55efaf485f3760b34935914f5be7edb43e116e843f94d8909e25c46d2bf1b7f0f6bc8bd06a641a294397fbe426bc0ec5cdd9555e770226436fa0e165a75fe09d625ccbbdd064a0c7e61dfc2619376f86f4447fe380cf608d9dfd9b7a5ca8c893feda1c6478403615cfe858c91808d86842d621b671564e00b067fd8b038f00160c9a5d4e21e14335b03a4283026bd3283afcb6c2393db1049f2c522d7491f4d94163809024645c43b3675a7202a97ec79ed2cbeae8c883dc491d6697d55d8b74deea635f488bf13fc5323dde812ebbd387018a84602af393ed496ca8390a3ef2f7136b56251a10ddc8b79a2f536754e4b832cb7e278a5820de2108339638c2212495c9a64923bb2b445c7abf439c8c19d8e8178a3a183e70f7f4a8fbb1eb5e8f551c403ef6ab6938ee0a83aeacf784ea5508147f69fd4a17b9600124dd82870c751198c972a344093b9c1c512c100ce7cb0587b5d2e52f4c370f0f1eb67319e933001f0ed665969770a947ea2a1987b5e566a220f2668389cc615537b27ff88731cda240c3a2c4286eaa9d6b51f57ec8ceb102c50c982d02dd61c3c1a64114405a59b011a65f11dffd6ff52da4ba7c42d6eac2f46f5fa50ed12730bed84992fdca003651cc78b73a9b72567d05b53da18031aad773614602b0aae960aee96d9f78f90db4a8086fe0cc41567c026964b66bc02ca02854567400d23f818ab27f3c0bb0d5fe4bb32ea52c33caf605dcb6c9daff688fce809d356152948d2794c7bc90d75d51367b24313f53ffd17463dd292e814262175e818291a9a4ec6fb1762b0be304d0ed55262b046a6ac1d986c6a083f1c3aff935210532faf4cb14660f52c77a4de6fd43a87881c85e5b06a42757fa91844e93bf0624bd451663dbd20a8e6261471c851c8fd711b8457bf3b135c660971c2942e9f623c9500034cb4292d1259a7ed339ad600320c987dcf905c81894ca4d40d116ecbfcd88da51d66d4e6b2ce34f3b34957564f729e048b7b0a1d5d3ebc6a7a81a79779298fd6a0c15db3a4bed7fdcb8b6a6f64cf32dfbdc7211a88c3fcb36f2590cff0d1e7edb1df732a629fc504104849809eb5b54322b098a0e0ed79bbeb6df8f67c292cb9043915185b44e4eb11bcfb052779f3125bbd3684ebe1b5bcd7c3a0f017a9c0c38ebb366d43c99e7677c282c5a3a2bd8f843c4a62e5dd7512c5b3585f45c1c9e00fa9ba7eb365d981cc3b4506551bdba4857a08fd84adf0487ff2bb4907d2ab4004655338c744ad08af9fcf7e43f30e3c35b50cc6f9686e0a109df24493712ed22fe7acdbae7f9509ecc96e321cfe5b13c54d82a6de6ad4051c858f997022fe84e5012ef0b18a3d923b667ae6d691573046b5e2323d1cf044191c81f31d64c6192c8b037e3a3863c8a5a7c42e81230045f6f8ade99fb4eb27c74e5c9745800b4d44ce0c26c024c51619614390a5f024c13858a4a0980ecf0bfa0b99369311c1a2c7bcdf7441e453968277e0a2aea290fd1558132d1b75f15c21261d270fd610fd01f2962e147cbd003c5ec1acb52c1181e924069d294694a1fcbd2ac3d3c79bd53bac2f0a1df33c5acef89dab228170293ddb16582eaaedd66ad60e9c1b7f64ae1dd2f5d10bf98303af3135cf3f47d0c2874237e621db6ace7d97b7f899dd41d4384d18bc8429b57ce063ffa28a391e4c6a9c52b41acbb9959c3ed9c262cc4a0c592543ae1d834843d9570d17b5f608aeee2876ae99cacf26cd2bc9c6ba28f794ed675ec859518db995e219f30fa2bb85553fe76987abfaf8f6440a00c381274df91f26bf4247a21ec29d4e8ea3defedbdda04f957365f8d227872c4069339641280c3f566ecd0282545162e8a931164d1ed2da3db3fe4ecd182a0e5acc3d7831be720cb7ecf372bde78c9581f642b5cec4220d1ff2102f2c26cd2eb27e9d19c3605d4f683dee4aa4e9453ec879880abe85d44d10f897ae28c7c7ef19d44f3b756252f3719c1395ff9366db35160f91c06c5457e1b2c1b65bc64f224d79ff0a5e7ebeaf7bafbf52e291005c5b9b576dc61182affe99fa3c7b3038c34463531a2ef5251b0619f44c86d0e2442edd3d70d0876123c75c0dcbc83695a014ea61370d1341603df247d37ec69caa0db9c9642d4af92d5731c75c9e568826ad643d75eb6d011a96e91cb5e7c1657726fe1e94ec9a7bc6042a174cbea45237bfb1a262e3dc0c90011fb0f73339a26e03d1c063ddf60a3f7c725f111c9ed645804c6f4b42d82150147516c6f475dc588f7dcc826f296c5bac6cd71b390c4323db01028ff99cd048cd43b727498d6a5dd4a3a25f521c04fde8770cf945b0827cd1da3a2bd27a65488ef44b2e319fa8699dbb644c50ce76800fe78e6fb725b08deb0c270c92b202836b5d6fc1f3b988fcd7798b80f483845cd8c143604ea0bcc42f22362ca972408dcdf1d6540a73cde4e5c6d47c57090c7e49b007cab75cdf7e60ae42ec8ea37c322ec1e0117af96b64df5bba24be504b2781185d1650167e9444eafb9e9d7a62b6b281e7433c02562ab0e78389e087bfb53561a3b251259b27d9f2492bee12dd2ae388735b2515b269edb5ba50510c53ba2acbefd7c45f0368292bc954514555d398ce0019a7feb8c9542208f5a182c08bd8c0700fbd387fdd1b11a5197c8e4f2c9ef30ef6ddd75ad2c7ba00dd6d9aec66bc333c894fd1baaac6073ae3875e5b5b6cb5798f4e96126b2502f18849a554a3fc8d4319475bad0235db34960bc2da2e6c025a4c5643bb31832ec1f5d1b5c022757c8d9ce8c0e73b7b75934ee151d2ed99c70ce84a93de843db72df4b27dbf5085659ffe1cd163e7b8350149dfaafc7d1a5c46065d1d381594703f0258e3fa5ee5f0783bd7ca1bb8dddf6619a27dffc6d7416a3fa75173d92f9b58c2af1f2a6050adbd627375c59b8e0301b17f05a2c6cf29ad2a82336ac90517631ab24f35a587f1543b91bbb6c6544eecc764926c90ad729e6e9d61091022f290f79f4b73ac055f2a9f702f24662e9298f362a29d5675f47557d122afa6dc3aa691b4f7555456b63fcd9b300f1a83691ce4ba792bed866c2a6fc3f13fbd7c866b17da929dd8cdccc7962d25dc92b7944e34616bf668191353378e24b33d80025ea4bf781e879a441d94589a67973386bdbb91a2fe8e652ca3d629521ebbdf1ed4e56be64fbb64a5c15199cc0faf5f77e2ff6e18c64e44d194d19dc43b00a31d825218562b0b64a8ccfd2c0eab2321bb7cd2b55b6666bb55b16bf460c7f33268605a9c26d9d8871ba2b9df6315a3fc66c80135efadf8512601c7d64159aa61628059ba8b83ec77d6f3658762b2cb784703f1be2f8164676702ce34fd1f96220e72ab17b0baeea90a89ef841bf64dfb1e902d720101252deca267a1c75ad54db11c787b2258d2b818a6c67d6c4a8999266694a4912138ddc91165e34d9afccf3dba6df00d3455b97543efcfc65a68e946dbbc5c306535a7cee56e94e6ef30b5c08aefb621f6ce298922116f0d01cf4f251bda330fa4bd7aa93bfb6bb26c2e5134632b557e08bac1a1b6f2a7e4fde4c319025b44c741bb71de3410e7ac3835b251002ca4c3bbc2dc87eadb2c4bc670dcd8b38d14f284970ebef52241e83f2f51e3b14e87757ddbe248f19a2cdc9b4368c6b741ac6f14729f9304ec4cbde8525b295a7a7ff53f335df1241e993a2911e063ac5f04b7099e49bddc5182bf78473bb74a5bd4b98d6754dfa3da9950b6fd75882815291776923014493041f8f525e953e13f4d9c6152d2eb4f16dc6762e8d84f639c7d1ee827fb654329fae8364fa0fc4118e3d937a92a3105a3209a14ee4bbc051e005d9ee1c858e3e150d8d67c5b7a3d7a07cfdc6a95d16e569db94d1ec34eb4ec9254786cc29ee1f3341fb4de0af5b7cfd18864fa73ba77d62b7bccf0986e181ea4806c8e27eb1179e4e6a27a6b2e31ddeee29f0f8738746235c43fefca018561979a2cd4d530be79ffe08947733a7c720633791fdc2b534dbda87f73b50f9e43f08604e308861e1bed4b977b623dac2228fb2b781861e59db95c6d48ca3d29c99345448404f1c2c2e2d43acc2f62b5c4b62fc36e4715bb095f2de39903b88affb73a1f48bc064b973a6144e966d5e3c43b02effeadd2cd2994569bf28cb155162efa95b378d4b226583611c44b59a91e27010b5ffeefcbca8cacb4ae97a4edff47653e9e112d003aa1403036fdbe681dceba4c48ec514868fc4626d29beba7af7c09f50a5738380f1df78f9bcfe0c62f0fea26318569655e5f7ea94d04708a5b61f3c141c485205a24c5789c2e52db092cd9d626036bdbe0403e4f8bc046eb8e0d531846de6da7094925f5f5af54f03c838e69555ef7412e8600b0d86d8f14af82aaf0f4c91827bf002ad7d1a7193af3c1f840c585be79c5ffeb2f5a946499f0e969b69c564d71cd4af1922099ca6ace8c4e08200beecdef0da94516a5e2f0cab73ac7d12d3c38fcf19f5d347cb406127534160291ada17873d6a4adaf1d178f3450758f92b2be1ae77da9f61be72bd50b6e2df3a49df24b608148f227f7b9add631a0541dda414d8a04f4ef66e100c2b8d4cc927db407998a573da5bf25d39134454d7d5c36828960f26c0f267c2bf54cdd5bc8f6a74e15777fe068ea337c444ef8122196c893604796ce4a4945886e35999ceb72c92841f438b4c3593371dc67cabb9e7ee74c2bb917baaa06fdc1f25eeabead184cc344c39643b84363418290fbfa2bf43feb754e3adebace255ee537e6a563af40ef523acc1a703fc037df742e8668b196385daca1659a89c64287d289793ed5cbb0a79189e05c211f2b0169b923dd50ca67cccf97f1b8512155f6fd305aa3fd8089f5a5701312441af7f69879181e89afc88ec30b5106ea5b403f8b5fc88ef17750777655c6743445b0bf1b4ff231e5665fd5209b4e7754dcbc6fdc999fe769d8e4a17b6d9ef7a8f0e0b7fdd81d8899c94c42facf41a37ba2ea0f942444fa4f2a5f17dffbe4f8c07b925aefe190d49da9cda74c88432bc19452a445595810116293200dfb4465ee3745d0d37337ae187303ca81256fb182c2514097b313a7f0c64f4972e0e95696adad3dfc53f516e5515ce03c523113980993506db72c7f95599e4bf4f787e32b5880c0d9f8286ae8cf9b1318b26949c21aca64b84a548ad38c77789bfc2d25e174544fdaead057ab7cd4f9cc867e90b0125caf90d20e82d591f9eecd806f5e4765d1d7a0ed25", 0x1000, 0xfffffffffffffff8}, {&(0x7f00000016c0)="bb2b7e0eb9efd93e9ddc0275c879f265e66b834b2aa942fb1fdc62449a6908755f3f9e133d0e236ffe20b2556d7e65b2f35944a773aaa36bcc24a2d5d540d8a21a", 0x41, 0x3ff}], 0x100400, &(0x7f0000001840)={[{'#! '}, {'security.'}, {'.*-!${*\x94'}, {')^*'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#! '}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) 19:32:08 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) [ 564.309192] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 564.310177] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (68 blocks) 19:32:08 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:08 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:08 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:08 executing program 7: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:32:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 564.364355] loop4: detected capacity change from 0 to 512 19:32:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 564.411701] loop6: detected capacity change from 0 to 272 [ 564.424598] perf: interrupt took too long (4063 > 4046), lowering kernel.perf_event_max_sample_rate to 49000 19:32:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 564.435526] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 564.436466] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (68 blocks) 19:32:08 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) [ 564.478757] loop4: detected capacity change from 0 to 272 19:32:08 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 564.498729] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 564.499894] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (68 blocks) 19:32:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'btrfs.', '\x00'}) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 564.515704] perf: interrupt took too long (5199 > 5078), lowering kernel.perf_event_max_sample_rate to 38000 [ 564.517456] perf: interrupt took too long (6555 > 6498), lowering kernel.perf_event_max_sample_rate to 30000 19:32:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) [ 564.533233] perf: interrupt took too long (8212 > 8193), lowering kernel.perf_event_max_sample_rate to 24000 19:32:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 564.576570] No source specified 19:32:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:08 executing program 7: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) [ 564.652008] No source specified 19:32:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:19 executing program 7: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:32:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='uid_map\x00') close(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=@random={'osx.', 'security.'}, 0x0, 0x0, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045430, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000005c0)={r1, 0x5, 0x0, 0x8}) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140)=@sha1={0x1, "bae5e1c242d129b4c6b55a76e49b341111904ccc"}, 0x15, 0x1) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)='osx.', &(0x7f0000000300)='#! ', &(0x7f0000000340)='security.ima\x00', &(0x7f0000000380)=':\\!%_}]^--#^\x00'], &(0x7f0000000580)=[&(0x7f0000000400)=')//\x00', &(0x7f0000000440)='#! ', &(0x7f0000000480)='security.ima\x00', &(0x7f00000004c0)='security.', &(0x7f0000000500)='security.', &(0x7f0000000540)='-(}!-{%{@%\x00']) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:32:19 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:19 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:19 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) 19:32:19 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) 19:32:19 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 575.001600] No source specified [ 575.013430] loop4: detected capacity change from 0 to 272 [ 575.072095] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 575.073987] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (68 blocks) 19:32:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:19 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) 19:32:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000240)={{0x3, 0xc}, 0x100, './file0\x00'}) [ 575.169656] loop6: detected capacity change from 0 to 512 [ 575.178965] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 575.182397] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:32:30 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:32:30 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:30 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) 19:32:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x56, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='securitv.#! ']) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045430, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000000)={&(0x7f0000000240)=""/156, 0x9c, 0x7e65dbb4, 0x80}) 19:32:30 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 585.997999] loop6: detected capacity change from 0 to 512 [ 586.009955] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 586.012789] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 586.046098] loop2: detected capacity change from 0 to 272 [ 586.049226] No source specified 19:32:30 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) [ 586.070927] EXT4-fs (loop2): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 586.072902] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (68 blocks) 19:32:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:30 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:30 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 586.140440] loop6: detected capacity change from 0 to 512 [ 586.163919] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib 19:32:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:30 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:32:30 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 586.171254] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 586.172172] EXT4-fs (loop6): group descriptors corrupted! 19:32:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 586.299875] loop6: detected capacity change from 0 to 512 [ 586.305371] No source specified [ 586.307475] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 586.316010] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 586.316754] EXT4-fs (loop6): group descriptors corrupted! [ 586.356515] loop2: detected capacity change from 0 to 272 [ 586.376189] EXT4-fs (loop2): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 586.377987] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (68 blocks) 19:32:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:40 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:40 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:32:40 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) 19:32:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:40 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0/file0\x00', 0x40000, 0x2c11bb638ba6769a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x11, &(0x7f0000000000), 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000280), &(0x7f00000002c0)=0x14) r4 = dup(r3) setsockopt$inet6_tcp_int(r4, 0x6, 0x11, &(0x7f0000000000), 0x4) syz_io_uring_setup(0x6dbf, &(0x7f0000000400)={0x0, 0xff35, 0x10, 0x1, 0x37d, 0x0, r4}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000480)=0x0, &(0x7f00000004c0)) syz_io_uring_submit(r5, 0x0, &(0x7f0000000500)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x0, @fd_index=0x4, 0xf19d, 0x400, 0x23, 0x9, 0x0, {0x1}}, 0x6) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x28501, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000100)={0x0}) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) eventfd2(0x5, 0x80800) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r8, 0x80045430, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000540)={r7, 0x2a5234dc887eb8c1, r8, 0x7e}) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) [ 596.090187] No source specified [ 596.112475] loop6: detected capacity change from 0 to 512 [ 596.127818] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 596.129976] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 596.130715] EXT4-fs (loop6): group descriptors corrupted! [ 596.142149] loop2: detected capacity change from 0 to 272 [ 596.167845] EXT4-fs (loop2): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 596.168791] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (68 blocks) 19:32:40 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:32:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:50 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:50 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:32:50 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x9, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000240)="177b323d8b173d0e9c93ea3ad91180bd23362d537f0c7a62b94e783c6fef00769ae0d148fce11c979268ad3f8c2decf723b0324f56d29878add7a04a6b503cfb525c06add5f8aceccd5b5d23abbf172fa3b777cc17aa388bb72f0fd0a07150e884fc9374b90c5a5dc85a9379540a288e33aac234e628cf3de65ed0f9bced083b4c1c1b735c3884ef2a423b9818e11892d85099c0323b44a4b0c7b8c8b79ce8af2c97c6172ecb7668cdeae8590fe4d1ffd7c93927497fdad072fe729c82916fa078d8b3a87489cb2b4aebc6c853fa3571af4219d3cd270a216ae053194b1922bf9e5c36500647bdabbba06e22e8c63317dac66553f6ce9854", 0xf8, 0x81}, {&(0x7f0000000140), 0x0, 0x80000001}, {&(0x7f0000000340)="2b990624f5b9ebf8515126eec073423b8063546747128dd1f2e3eb2b4fcf034d6c414714d15299b3d4e1d358242b64c6aef9155a4903b30f60a0bb98ef48a7efc2f17b642473d096191915ae2d30f263bff9c2e834fdfda0d4d3788609eb0a1d899dc438e78c7b2c9a5515b090e7c34588386c4ba9393df782e0d7850a40b246fada1e4fa1701b5895e6a39890e42a0d3b4115515d7d2f243fa5fd752f6b116437c58a713046d8efe1b4dd2f9c5df9dafb2ce1a6e48047567988e5233d4d1c323799ef5afc6207cf2745a85c88ba6d7f777428a5a234177fb4071c533a08596be938d20c654a73f3c4d7a125fd1b45afcdc91d5f2904fb1d85", 0xf9, 0x3f}, {&(0x7f0000000440)="861ceb80f0c129ff8a267abbb41c3f915d3201e68629f699152efdee1d44fffe451a9a0fd0998e05ba00bc4df6a6209b856687141c2f9ce309290235cbbb9ed17bcec7a1935c76d19755a013790dacf2ac735c3bee03d3a43053bdcac3dd9e990a43a558342bf354e0f3e9c33a8259f98dc5af826c4d7497363248", 0x7b, 0x2}], 0x0, &(0x7f0000000540)={[{'security.'}, {'#! '}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfshat={'smackfshat', 0x3d, 'security.'}}]}) mkdirat(r0, &(0x7f0000000580)='./file0\x00', 0x1c8) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:32:50 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 606.576856] loop6: detected capacity change from 0 to 512 [ 606.583859] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 606.586115] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 606.586982] EXT4-fs (loop6): group descriptors corrupted! [ 606.614183] loop2: detected capacity change from 0 to 272 [ 606.615777] loop4: detected capacity change from 0 to 512 19:32:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 606.652700] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 606.671205] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 606.696323] loop6: detected capacity change from 0 to 512 19:32:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\x00'}) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 606.711384] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 606.715612] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 606.716342] EXT4-fs (loop6): group descriptors corrupted! 19:32:51 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:51 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:32:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:32:51 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:32:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 606.866280] loop2: detected capacity change from 0 to 272 19:32:51 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 606.890677] loop6: detected capacity change from 0 to 512 [ 606.914656] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 606.930222] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 606.930978] EXT4-fs (loop6): group descriptors corrupted! 19:32:51 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 606.949694] loop4: detected capacity change from 0 to 512 19:32:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 606.987352] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 606.999076] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 607.031423] loop2: detected capacity change from 0 to 272 19:33:03 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000100)={0x8, &(0x7f0000000080)=[{0x5, 0x3f, 0x1}, {0x0, 0x9, 0x60, 0x4}, {0x2, 0x81, 0x1, 0x1}, {0x81, 0x0, 0x1, 0x4}, {0x7, 0x0, 0x4, 0x6c}, {0x6, 0x2, 0x81, 0x4}, {0x8, 0x8, 0x6, 0x3f54}, {0x40, 0x7, 0x8, 0x8}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={r2, 0x1, 0xffffffffffffffff, 0x7}) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)=@random={'security.', '#! '}, 0x0, 0x0, 0x7) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:33:03 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:03 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:03 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:33:03 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 619.478485] loop2: detected capacity change from 0 to 272 19:33:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 619.537408] loop6: detected capacity change from 0 to 512 19:33:03 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 619.551073] loop4: detected capacity change from 0 to 512 [ 619.554347] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 619.560401] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 619.561142] EXT4-fs (loop6): group descriptors corrupted! [ 619.592172] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 619.594091] loop2: detected capacity change from 0 to 272 [ 619.602581] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:33:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:04 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045430, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000000)={0x0, 0x0, r1, 0x90}) [ 619.695920] loop6: detected capacity change from 0 to 512 19:33:04 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) [ 619.710929] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 619.714209] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 619.714951] EXT4-fs (loop6): group descriptors corrupted! 19:33:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x56, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='securitv.#! ']) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045430, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000000)={&(0x7f0000000240)=""/156, 0x9c, 0x7e65dbb4, 0x80}) 19:33:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 619.812643] No source specified [ 619.834842] loop6: detected capacity change from 0 to 512 [ 619.851661] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 619.856895] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 619.857633] EXT4-fs (loop6): group descriptors corrupted! 19:33:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:04 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 619.926908] No source specified [ 619.927407] loop4: detected capacity change from 0 to 512 [ 619.944793] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 619.956987] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:33:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:12 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:12 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, 'security.'}], 0xa, "a044f1fe5aaeae677c01beacb93aaef2179f9772c4ce99eb5075cacd847b7c6897bfa0bc064f680ef491990550fdb5eeae2050c49fa44ab91090489ac17f202c961e92436c052be27fe14b19fcc5a4766212db9f8e4543992350048c7d2391be293467d96d6f61e8a7f61804af094c1f1f9d7c"}, 0x88) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:33:12 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:33:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:12 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 628.075173] No source specified [ 628.111714] loop6: detected capacity change from 0 to 512 19:33:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 628.142205] loop4: detected capacity change from 0 to 512 [ 628.146986] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 628.159824] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 628.161357] EXT4-fs (loop6): group descriptors corrupted! [ 628.177312] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 628.186475] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 628.198817] loop2: detected capacity change from 0 to 96 19:33:12 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x14, r0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x85}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='system.posix_acl_access\x00') removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) r1 = syz_open_dev$mouse(&(0x7f0000000340), 0x9, 0x8000) mknodat$loop(r1, &(0x7f0000000380)='./file0\x00', 0x800, 0x1) [ 628.214033] EXT4-fs (loop2): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 628.215157] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (24 blocks) [ 628.404202] audit: type=1326 audit(1761420792.761:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7010 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9df200db19 code=0x0 [ 629.203200] audit: type=1326 audit(1761420793.559:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7010 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9df200db19 code=0x0 19:33:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x3, &(0x7f0000000340)=[{0x6, 0x3, 0x0, 0x7fff0000}, {0x4, 0x7f, 0x7b, 0x10001}, {0x4fc, 0x4, 0x1, 0xff}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='security.selinux\x00', &(0x7f0000000240)=""/239, 0x11b) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:33:24 executing program 5: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:24 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:24 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:33:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:24 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 639.930863] loop2: detected capacity change from 0 to 8 [ 639.952367] EXT4-fs (loop2): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 639.954240] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (2 blocks) [ 639.984264] loop4: detected capacity change from 0 to 512 [ 639.985156] loop6: detected capacity change from 0 to 512 [ 640.005320] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 640.013717] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 640.015219] EXT4-fs (loop6): group descriptors corrupted! [ 640.020880] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 640.034150] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:33:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:24 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) 19:33:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x7, 0x4, 0xff, 0x35}, {0x4, 0x6, 0x80, 0x2}, {0x5, 0x0, 0x8, 0x3}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.opaque\x00') 19:33:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:24 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 640.222005] loop2: detected capacity change from 0 to 5 19:33:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 640.247838] EXT4-fs (loop2): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 640.249881] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:33:24 executing program 5: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:24 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) [ 640.311925] loop6: detected capacity change from 0 to 512 19:33:24 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 640.346001] loop4: detected capacity change from 0 to 512 19:33:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 640.383234] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 640.385349] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 640.392208] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:33:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0xaf, 0x4, 0x0, 0x7fff0000}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000000), 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000002c0)) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0xa, &(0x7f00000003c0)=[{0x0, 0x0, 0x3f, 0x6}, {0xc2, 0x81, 0x1, 0x2}, {0x3, 0x0, 0x5, 0x6}, {0x80, 0x7, 0x7, 0x2}, {0x3f53, 0x1, 0x1, 0x800}, {0x3f, 0x5, 0x0, 0x1f}, {0x4, 0x1, 0x80, 0x9}, {0x8001, 0x0, 0x9, 0x1}, {0x101, 0x0, 0x3, 0x7c5}, {0x800, 0x1f, 0x20, 0x8}]}) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)) write$binfmt_script(r2, &(0x7f0000000340)={'#! ', './file0', [{0x20, ']*'}, {0x20, 'security.'}, {0x20, 'security.'}, {0x20, '\x98.{'}, {}, {0x20, 'security.'}], 0xa, "d9b632fd20054afeb0fc8f169fd5f3b327ecfe0dde"}, 0x46) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0x400500, 0x0) ioctl$int_out(r3, 0x2, &(0x7f00000004c0)) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00') [ 640.396331] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 640.397966] EXT4-fs (loop6): group descriptors corrupted! 19:33:24 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) 19:33:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 640.666375] loop4: detected capacity change from 0 to 512 [ 640.685788] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 640.693929] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:33:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:37 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:37 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) 19:33:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.opaque\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c65300ab653ba5114d98bfb3803564ef6b9367cc7b2f0e0ac5e483478806dae1d39f0abe4cc0211aedd6588c4536a98cde0fcb93ea9c97eb0f7aeda02c6b3abc1eef8fc0f1403d3ba18330b88fc294cc7a83432c2bb9ad43497c6449ad066f475df372118d65c372ac905000000a1edb178aae923315e60b714dbb35e8bd5c4fc767d54b496c29a5183fff1c2d73191f04daf50ad6eeb851dcb173ddb0ef2a80c06fd1b3c6540ed5f8a927de356e0427435e67297c990dc1cdb7ab27a07"], 0xc5) 19:33:37 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 652.759331] loop2: detected capacity change from 0 to 5 [ 652.763221] loop4: detected capacity change from 0 to 512 [ 652.775687] EXT4-fs (loop2): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 652.777231] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 652.784121] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 652.790226] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:33:37 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 652.836169] loop6: detected capacity change from 0 to 512 19:33:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 652.878677] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 652.889809] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 652.891178] EXT4-fs (loop6): group descriptors corrupted! 19:33:37 executing program 7: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) 19:33:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='security! '], 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 652.997223] loop4: detected capacity change from 0 to 512 19:33:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 653.021355] loop2: detected capacity change from 0 to 4 [ 653.060206] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 653.073462] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 653.075347] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 653.077061] EXT4-fs (loop4): group descriptors corrupted! [ 653.104226] loop6: detected capacity change from 0 to 512 [ 653.121087] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 653.128237] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 653.129236] EXT4-fs (loop6): group descriptors corrupted! 19:33:49 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:49 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) 19:33:49 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="6f73782e232101"], 0x0, 0x0, 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000006800)=[{{&(0x7f0000000240)=@ieee802154={0x24, @long}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/19, 0x13}], 0x1, &(0x7f0000000300)=""/32, 0x20}, 0x5}, {{&(0x7f0000000340)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private1}}, 0x80, &(0x7f00000016c0)=[{&(0x7f00000003c0)=""/143, 0x8f}, {&(0x7f0000000480)=""/224, 0xe0}, {&(0x7f0000000580)=""/201, 0xc9}, {&(0x7f0000000680)=""/41, 0x29}, {&(0x7f00000006c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001740)=""/182, 0xb6}}, {{&(0x7f0000001800)=@nl=@unspec, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001880)=""/211, 0xd3}, {&(0x7f0000001980)=""/54, 0x36}, {&(0x7f00000019c0)=""/91, 0x5b}, {&(0x7f0000001a40)=""/37, 0x25}, {&(0x7f0000001a80)=""/20, 0x14}, {&(0x7f0000001ac0)=""/197, 0xc5}], 0x6, &(0x7f0000001c40)=""/230, 0xe6}, 0x400}, {{&(0x7f0000001d40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000001dc0)=""/8, 0x8}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/19, 0x13}, {&(0x7f0000002e40)=""/82, 0x52}, {&(0x7f0000002ec0)=""/63, 0x3f}], 0x5, &(0x7f0000002f80)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000003f80)=@qipcrtr, 0x80, &(0x7f0000004300)=[{&(0x7f0000004000)=""/249, 0xf9}, {&(0x7f0000004100)=""/46, 0x2e}, {&(0x7f0000004140)=""/45, 0x2d}, {&(0x7f0000004180)=""/212, 0xd4}, {&(0x7f0000004280)=""/91, 0x5b}], 0x5, &(0x7f0000004380)=""/193, 0xc1}, 0x3}, {{0x0, 0x0, &(0x7f0000005980)=[{&(0x7f0000004480)=""/23, 0x17}, {&(0x7f00000044c0)=""/253, 0xfd}, {&(0x7f00000045c0)=""/159, 0x9f}, {&(0x7f0000004680)=""/145, 0x91}, {&(0x7f0000004740)=""/105, 0x69}, {&(0x7f00000047c0)=""/122, 0x7a}, {&(0x7f0000004840)=""/49, 0x31}, {&(0x7f0000004880)=""/4096, 0x1000}, {&(0x7f0000005880)=""/73, 0x49}, {&(0x7f0000005900)=""/75, 0x4b}], 0xa}, 0xfffeffff}, {{&(0x7f0000005a40)=@caif=@dbg, 0x80, &(0x7f0000005d80)=[{&(0x7f0000005ac0)=""/211, 0xd3}, {&(0x7f0000005bc0)=""/154, 0x9a}, {&(0x7f0000005c80)=""/194, 0xc2}], 0x3, &(0x7f0000005dc0)=""/179, 0xb3}}, {{&(0x7f0000005e80)=@ax25={{0x3, @null}, [@remote, @default, @default, @null, @rose, @null, @netrom, @bcast]}, 0x80, &(0x7f0000006000)=[{&(0x7f0000005f00)=""/55, 0x37}, {&(0x7f0000005f40)=""/192, 0xc0}], 0x2, &(0x7f0000006040)=""/171, 0xab}, 0x3ff}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f0000006100)=""/108, 0x6c}, {&(0x7f0000006180)=""/99, 0x63}, {&(0x7f0000006200)=""/82, 0x52}, {&(0x7f0000006280)=""/104, 0x68}, {&(0x7f0000006300)=""/147, 0x93}, {&(0x7f00000063c0)=""/103, 0x67}, {&(0x7f0000006440)=""/247, 0xf7}], 0x7, &(0x7f00000065c0)=""/28, 0x1c}, 0x1}, {{&(0x7f0000006600)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000066c0)=[{&(0x7f0000006680)=""/15, 0xf}], 0x1, &(0x7f0000006700)=""/195, 0xc3}, 0x7}], 0xa, 0x40010042, &(0x7f0000006a80)={0x77359400}) connect(r1, &(0x7f0000006ac0)=@generic={0x26, "120ba8c3359d63bc51a446e50e8221b3c6e6520011a813c90f482f1967c7e12fd666c9582c6cd882f1dff0cf95b4f81bb389249e74c1279bb388e0f165af083cee8548b86752e05849ab42957a8c829a9848ced98affa383f89bd0367b39fad5220788564efe9d8b79c75ce4e0450ce1232c632fab6a2c4afba84444c8d6"}, 0x80) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000006b40)={'\x00', {0x2, 0x0, @dev}}) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) chdir(&(0x7f0000000000)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) 19:33:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.opaque\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c65300ab653ba5114d98bfb3803564ef6b9367cc7b2f0e0ac5e483478806dae1d39f0abe4cc0211aedd6588c4536a98cde0fcb93ea9c97eb0f7aeda02c6b3abc1eef8fc0f1403d3ba18330b88fc294cc7a83432c2bb9ad43497c6449ad066f475df372118d65c372ac905000000a1edb178aae923315e60b714dbb35e8bd5c4fc767d54b496c29a5183fff1c2d73191f04daf50ad6eeb851dcb173ddb0ef2a80c06fd1b3c6540ed5f8a927de356e0427435e67297c990dc1cdb7ab27a07"], 0xc5) 19:33:49 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 665.158279] loop2: detected capacity change from 0 to 4 [ 665.163341] loop4: detected capacity change from 0 to 512 [ 665.184779] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 665.186362] loop6: detected capacity change from 0 to 512 [ 665.186861] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 665.197098] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 665.198599] EXT4-fs (loop4): group descriptors corrupted! [ 665.222675] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 665.244516] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 665.246423] EXT4-fs (loop6): group descriptors corrupted! 19:33:49 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) 19:33:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:49 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:33:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:33:49 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_default\x00') removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'system.', '#! '}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045430, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r4, 0x80045430, 0x0) ioctl$FICLONE(r1, 0x40049409, r4) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000004c0)={r3, 0x0, 0xffffffffffffffff, 0x4, 0x80000}) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1800000, &(0x7f00000003c0)={[{@subsystem='net'}, {@subsystem='rdma'}, {@none}, {}, {@subsystem='net_prio'}, {@subsystem='pids'}, {@subsystem='memory'}, {}], [{@fowner_gt={'fowner>', r2}}]}) [ 665.459526] loop4: detected capacity change from 0 to 512 [ 665.469405] loop2: detected capacity change from 0 to 4 [ 665.492120] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 665.495046] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 665.509626] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 665.511382] EXT4-fs (loop4): group descriptors corrupted! [ 665.538351] cgroup: Unknown subsys name 'net' [ 665.553238] loop6: detected capacity change from 0 to 512 [ 665.572310] cgroup: Unknown subsys name 'net' [ 665.589736] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 665.599085] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 665.600413] EXT4-fs (loop6): group descriptors corrupted! 19:34:00 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:00 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {0x0, 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:00 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.opaque\x00') 19:34:00 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:00 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) [ 676.438706] loop2: detected capacity change from 0 to 5 [ 676.445273] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:34:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 676.477886] loop4: detected capacity change from 0 to 512 [ 676.483456] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 676.486672] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 676.487391] EXT4-fs (loop4): group descriptors corrupted! [ 676.539974] loop6: detected capacity change from 0 to 512 19:34:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {0x0, 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 676.565373] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib 19:34:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) fstatfs(r0, &(0x7f0000000240)=""/147) [ 676.576318] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 676.577731] EXT4-fs (loop6): group descriptors corrupted! [ 676.579375] loop2: detected capacity change from 0 to 5 [ 676.621109] loop4: detected capacity change from 0 to 512 19:34:00 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:00 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 676.638664] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 676.640985] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 676.641402] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 676.641712] EXT4-fs (loop4): group descriptors corrupted! 19:34:10 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0xa0300, 0x0, 0x14}, 0x18) 19:34:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {0x0, 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:10 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:10 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) 19:34:10 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 685.902889] loop4: detected capacity change from 0 to 512 [ 685.913459] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 685.917073] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 685.917907] EXT4-fs (loop4): group descriptors corrupted! 19:34:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)=@random={'security.', '6! !yN\xf2U\x83\xe3\x06X\xc4 V\xc5\xf4\x9a\x97\xe1\v\xd8\xdan\x18C\x8a\xd1\xb7\x9d\xb1\xec\xc6?++\"\xbb\tL\xd0H\v7\x87&\x06\xbfG<'}) [ 685.982182] loop2: detected capacity change from 0 to 5 [ 685.986896] loop6: detected capacity change from 0 to 512 19:34:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400), 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 686.006287] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 686.007649] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 686.016744] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 686.017482] EXT4-fs (loop6): group descriptors corrupted! [ 686.041832] loop4: detected capacity change from 0 to 512 [ 686.051274] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 686.056005] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 686.056759] EXT4-fs (loop4): group descriptors corrupted! 19:34:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400), 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400), 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 686.183233] loop6: detected capacity change from 0 to 512 19:34:10 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0), 0x0, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 686.198959] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 686.203274] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 686.204120] EXT4-fs (loop6): group descriptors corrupted! 19:34:10 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x3}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:34:10 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 686.281220] loop4: detected capacity change from 0 to 512 19:34:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 686.312517] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 686.325516] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 686.327207] EXT4-fs (loop4): group descriptors corrupted! [ 686.342743] loop2: detected capacity change from 0 to 5 [ 686.346798] audit: type=1326 audit(1761420850.703:19): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7229 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9df200db19 code=0x0 [ 686.363019] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 686.389503] loop6: detected capacity change from 0 to 512 19:34:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 686.473466] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 686.484920] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 686.486283] EXT4-fs (loop6): group descriptors corrupted! [ 686.569333] loop4: detected capacity change from 0 to 512 [ 686.577692] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 686.580444] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 686.581936] EXT4-fs (loop4): group descriptors corrupted! [ 687.174055] audit: type=1326 audit(1761420851.529:20): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7229 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9df200db19 code=0x0 19:34:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0xa, &(0x7f0000000240)=[{0x6, 0x15, 0x2, 0x8}, {0x4, 0x7, 0x80, 0xfff}, {0x9, 0x20, 0x3f, 0x3}, {0x81, 0x5d, 0xd}, {0xb4, 0x1, 0xfd, 0x2}, {0x83, 0x3, 0xc4, 0x3}, {0x5916, 0x7f, 0x3, 0x9}, {0x5c56, 0x3, 0x5, 0xed9}, {0x6, 0x7f, 0xec, 0x40}, {0x6, 0x6, 0x4, 0x4}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:34:21 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) 19:34:21 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:21 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0), 0x0, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:21 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 697.245975] loop4: detected capacity change from 0 to 512 [ 697.257703] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 697.262921] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 697.263949] EXT4-fs (loop4): group descriptors corrupted! [ 697.281194] loop2: detected capacity change from 0 to 5 [ 697.288845] loop6: detected capacity change from 0 to 512 [ 697.310230] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib 19:34:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000000), 0x4) mknodat$loop(r1, &(0x7f0000000000)='./file0\x00', 0x6000, 0x1) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:34:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 697.327338] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 697.328365] EXT4-fs (loop6): group descriptors corrupted! [ 697.336647] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 697.390867] loop4: detected capacity change from 0 to 512 19:34:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0), 0x0, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 697.403388] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 697.405897] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 697.406698] EXT4-fs (loop4): group descriptors corrupted! [ 697.523002] loop2: detected capacity change from 0 to 5 [ 697.541277] loop6: detected capacity change from 0 to 512 [ 697.543957] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 697.554074] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 697.558909] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:34:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:30 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:30 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) 19:34:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:30 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x206, 0x1, 0xfe, 0xfffffffb}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001440)=ANY=[@ANYBLOB="73656375726974792e23212066b825cb7e024a15f5401f3e23f48b99dd67"], 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) syz_mount_image$nfs4(&(0x7f0000001480), &(0x7f0000000080)='./file0\x00', 0xffffffffffffffe0, 0x4, &(0x7f00000013c0)=[{&(0x7f0000000140)="38a9e2bb4aedccc726528f694b372bac", 0x10}, {&(0x7f0000000240)="4a1e0e96b6d3ecee8f6042a7dee851f5bef3eb3ed2eaf5e4065e315b1988bc8901bbc6b1e3b2b79d7b0f84a679360647b15e31383e874d5020e7da0e9ae18a712192452b3502f36f5b20f4f2e92d424e955ef3cfd19a2521ff70d6305b8be8ac86bf968de2352719c2daf9bba4e519a32731e2961216f77e32ae8de37b5266af336b781505aa54671aaa7736f9de8521a4496c40bab1b335b8f227b7e50db9c6225fa4798c36013b4505dab05190f8c8621ded14f098d7cc092c85c95945cd1ea69569926a52bb268c51f132bdd9b02e7f8f47cb6b53b677907bff518f3ca9af68a2037d22306798adcc75d39319bd761654717032b15f3024ea3276ca3c78cf5ddedb6721842d56e0b94fa4d416375cfdaa295ea820cf3cc268cd13232bc9848b217f80804d5e2487e4be52cab3d597d89b3691a335580d505739c70628f85bd2ed878febb2b33de54e44c2f8c53be7ef62edb03433e62fcfae284dbf41ba0d18d8e7dc7c8315274f4471169bde8e693a287b7b0353c583c91bf208d0911b23c3184f7ad32b13ec17af5c02ec3287322e462d95ad61e4f09ca3f5fabec8a4dc5d9867a8a261d8ae07b6cb0b7fd053f21cd51d4ba46f9c61e9a45cc6d7eb872d6a6c0a942925969a50801af8458d573f90e76cbf890b11eac6d82f047490336ff472f5dd372d50b7f3344d3bd6d0b5b6e211427b26c02e7c1b535d4ea98b5af37e575bad587b50b3529d95d8f6ad8cfd04490b4c4ee11594df619db902548f3d48f1e02f45d3bbd2fecda476aa951ed68756a34df82336f1c409441a0e21f27758d6d9f8c087316945fa39f411f3f4c081247df0da23dd60b4a9fbbe9085d58605fdf8a4832021758f12550735103778010416bac671681c8581a08a9f57688f2401da5f2ebbf140924dc26b3ed7d8cd82f5518d02217b34d4f1bdf6e376a4a9c573716397a0d040119195df2701163a3b50683842c882d71fdde72697687cd9b2b2620080cb885f3be26000abf18eaf5e4c021cab21a4c949de64954aab3d8aaa08fd7169dd722b943e0f28e3f9b2d7b860b3b08feb6208a91beb33489097d815878bceb227fb7382f504aedea154bd106c6b4b46304859dfd866ee1ec4cc32936edc769e0a07a1e5d0935a92b3820fcd8fbc4b83fb4a4c4dfe1f33b3534587788bd3c67e60bbe4bd39dcd733cb9809ccc9470caa1fb75554787003318ac2519e5c8c9e75087abd1a044ecfd5c7e2d2312f5ba1c4535de4dd5c257933fe94c29a818597072596ef0044d36a3d74ee402b5b937d9487c84297cc15c8933732abbb09843c3fb65e618218b4b6bc1e5e940bb223a6967dd0a0ee3ade5521e10f2f12222ce5bb57efd11b90f4820525d2b7022d2e6654464f517b2deb3192c71452c7adc7d648be0ebb79a5e050c8d2dd6bd1d89eaad24ece0fce8a38cdf187d60f701f08561167996abe75276a039b82b3ad33d22f3d4e88e517debbdb9966cebe291b009571dccb98dafad0ab7c75035c1aff2d6581b0f4ce7a15d508ebc6237682c36df478d3b23e809b39f50469092898ba06fa86acddd6381a8786638ebe166027779f88fad209f3e95067b1bd87c79baaa8db808a9c591fb7bd512364052ac4115fa17480265cb181d3cf0f51d51c183ece7dba3e165af8445ee18c30ec471705545305c6f00d3cd1c026bb88f7b3cf38fa5f5f1d16120b7ed7443c91a564910357a7c6b8f35fb243411466585a103429dcf35724747552bb1a93d96db5f7b8dc8d5d214587e29f3d992a086a949747183bc9f7c4f3e2ad369cc3c66c7ba3df433b354ba38edfa063695fce08c21160d8584b1e943fb947a69cbed37f753566103353fbc5aec4c877df67cc28152d0b2c38abb615a514773e8f1b57ba00ad6517709743f3db880c893db9029d9ddbd73574fcdfdbdc5c596bcf81859b421faf2489b821821f5fcb3cc96628b84bcf82cc73bdd0d054b2e15ad86e2b7df01a35782047e5872c822ab2115004a674d3ba815ce29dbfcc745ad0b5872354d94da7ec044cde7622d393d51c92ac2439b8115e11fe73bc1b4485acd4f2b07dda96105cd77067dadb3016594eac0c1e64d693eda51cfa239cd1bcd8bd7513fb1bf491b9c0e318ed1375b926265808c7aee0534b5a21e4e9871eaeb4052d613a154fa1cc557a80552576fb61ed58e22500865602e9d1b31b437c1a7eb98a40dd38d5348cbe14a30d665b493c28a1e4a53777639476889a4b1729f2b3a8712ee17adddbd302806ac5d11eb9578e58ed3425d28603c243e51102a91344572f41d8ac0dfbe08c866479459bd181d6d21d084ef0528253c707aa67363e871763ccf77775ea8361e59a9b692fadb20655e42eda0b1a62dda2f7d956a697ffbbfd16271df6972776d5b650fd4c0f93c6baf12c7c7108aee68bf8bb4d5aee1b5c80206b3b9ae088fd99f946c60f2ed61485af38457541b93757fa0433fae7d3aa7111114828e7f38f199c217f4d5290a8ccc7e818343360377b212f470cba1707b288f40fc5e5a79f5fe7d5f6c4f06fdac1b559eee5879b2bb598976731f4d2a629ea8789928aadaab089a67bf6c05c931fe39bee6cfe108015381782b91764d0010f999cef53f0f198cd212db7668bdeb1dcc379c1f5169df9445da77e55561b55c468d80415c1390de674f1a20d7ca4263703ea0ce6542baa1aa3328d416e40a952923db50086d64f8cb56f2fae1eeee48be22483a1222f18fa40afe06d3dcd5d0fe5dc40238bfa2195d3626230d5b9bd9ab303f52c0b2355b192ad57b8de154c55334b2b969166080e171a1996b78184396c3abe665446ce694ef9a86906453f03a0537aed62011ddf26865dadf924af1885e503aa44d52dd96895da1e0818cb20a036c02038ac15f14402dbe2d7aab4d7c2ad2023f7a6131b031a7c71c4618b3f8fefff425f0b928f73c77e8a427fb3474e5d1d802fc9a5d4257738ce7ed1a71afe908026bff499034c8d3cdf3dbcd8c9be7af03bad12d6815540dc6b6cb940ecf2121a8e4b911d4e6ad3a2e043affd7ac5ef2e07fe92ed292af10b21c707e50470d81e99a468cfb880ff7bca6910244f8909a149770e709aa4de61e357901dc506bf0056a3a399ddcc5f6938fc95ba9234b76344e5cee032987d75a68705fa9647c1ffd5b89287cff72d7fd98eb13254a4249eaee9586db3754e59a0ae1b4e7bb0e22441c839e169d37da65a6f5b296edeab6dddcb04f9f635cd1e5d68f63ad7367b7c2a20198b7dd6b5a56de5c209f79d123f6e07c3a5d03e9ef1f63e57cb1f125d8ea921909f59e1134853854a11c4840530b979b60696c26daf5235b490c490774410104965c65473cac9774a988f3333c3e15d3a16c84a594754e7f044cdd8835f97db0cf9ab7819304c462d6e99dbd89ab6b90029b4b69bc875866c998504587adbb2ae1c94a520b267b5e6eb80f2dcd72e1abaa0e73b3a16df9a6b20bdec795d913b0fdc91c85b45edc1086ce03ec8b516f39de7f7854ab5c053525a236a39cc247ef3b454233b8bf24bad3dfd8054a8540163ac2b01846eed193804c4925924258439e52322a5fd778f92a7309f33834770e0342219b3ebe328cd6a0f4b1ecff8d7ec9acd5998fdf3162691eedb2ba7874e76cb1e2a2e6d848231183d43c9a8d1d40fd1bdeb5735a978c2903859d0c3e3efeffaee52897c4e98c44eb217fef392ba96962d1d201aa976e4cc15aa932189e63d22ce5b2e91d3e1426b38c6f354fb8e722b5acb263b1efe9bc7077bf8a7573eee28fdc5f58af5aed26cfd88da1af9c24c909c7c34260af439b4e8e222d9a9a55782410cddef30385c01ea1073029723b3bdec747719549c7335de38dcb40ba3129132d2a5c7b1a601f55ef3595600a810eb52cb272bf86f50cd20139841cab76b1ddf462f5d52fa30b1add69eed4cbcd01b2d2a7d4ed8fd3d878dce33a39b33f4d48a0283885407ac58adf09f8927ea0abe008182ebe879e35f9fc6ae62b4c6b71f324ace3f84f911bcd8b0db006019d545c24baa07fc35b586bc61e177912a42c2470c44f8e3c4c63e411a7e128c1dd159cd6bf9e4ecaac1332c5d85dbbe96b48dccfa3b7e82a0b0bb029126be42a372bbf984009b7796eb39084a06615bbf33436af9bc1c7a75c9bbda640aa1c8e7dd470a100d481040bf96f103b99393b0c8e3530a2c875bbf84fe445f2732e9f30a1dd6b4d6a6667bd0ec341dd45460d1397c0845bbcb0044e0410d6197738f189dbd0a4b03f10edf149bd0368e0f0f01d1c4a2ed939db16508d5d1788d74f379d3ffc2fff8961239e5b0a48aaecd08075db85767405de9431dfb73062cc5deab10869ce647714a5d748d9775a5b67dc4d201434b37423f3ad306c9d993d2e1a87b0c426ed5c18a32360e3d2c582f02c3c6014646b9972034397a19158606fbcb0f66e5ec09bc87766bf7dd749dc5836d51f3728157dc0cb915d17e4b2c7db2ab3181e664f72f95a8319f972d38ad0cb86e90e628f2841ea8ae297dd2f2d7366a91f12ec22e66943d060114aa28ed91b8e2cb9a948d5ce0d48f71aeeff64c4e2a47f5007424d5fd3f8b9aa8d881b0192716d9790446aa88a9e609b32871d0e2d3fd94472e81d9ca9c0ce8bc0609efb17e419b83ffd6f89fe04c1224aa5187d15c916e41d7149e91eb19f1b8f35237194afb140b9fef29cf6f3bd0c1188d45f1bbc44a2cce8195f95c78fc334fbb3869f03c425941adf9174c52d380f0cba65f8db025cd6b7630b18f07f319621b5e894cc55b5372cb28bbbae4e3e5dc1aa5ebd3dff42bc39591955ebbc7494db8223af09f9a6869755ec434cf18e87dfec4b08d2b5275f56d3f56ef18b5972caee1446aca63ccb5a37c28a6650a4f722e99c7e2fd30db902feebad42e6b8b5e498401792dd8fd73ba122a5b7b481b92bdb40a6312b03794787907a207bbcf33cab5e303b713ef3cf2a776aefb8e2bce96c3538be20f5d7aa0bd4174e3ef54b989cc8f1616688d044afb4f9357e64cc6a8d2d68fc64bab9048e6395f773d16dd3ee4389a3fe4786d5e6f5d16ea5d50e0263c2a2468d2c9e24656a5a05b70ed956ded172a38cc90e89a82dada9d865ecbc34b5006ae468e5c33bcd82ce7220a0e00dba73052521260082895ba65d96ca7d60ed75c4b875a4c08de62a16b896d94a922ac498b365c6c217ed5b35a2ece751297cd4a773c80afdac0bc38c1668e8d347b89838f6f9eac37ac7929f6e28e2aff8f8ac0770dd2a1772dae5fb5a237a8a1305c8ee3437795275022f44e47811165454f11df13c507304289965259bdb95840215c5684318e7185321c738607fcb07d6114859e77e76c8850a84d92bc647ca27bc21bc8374fffbf66f09d60c14690bf372107452abc6ade3956956c9174b33a8bb95b60df38ed29bbc8d1252c0c2a8d0e7f9040589d435baee9b09336d2903f6341fde2d7108ccfff8ca90e985f6550c015bf7ffa11c1641ee6c25a8d67ba75c991a231466555d39c253f0bcd5b96d237399f932a26ff9a14aeab1eccbedef059d37156274a75d74e9d712ca2fada9ade7093b805dd021adb4eaf8e7e89ae7c880a8dd07e2ea8f20c0e0c42575a34930939a85cda15dce93c811c1044a98889db4f1bca7f9eca32e893429b7e524d8d043c830f070c27bcafdebb98943a339f35efab477c3b65f57658ae3ad7bb7e09ce4daecb7a9fcec7754bd20bb2b5def5e82c7851531a63952fb5b39d04ebfd448478f2f658673dba94955b29bf0bcb923865fa05b9e5cf9539b49eb1ff4f29be", 0x1000, 0x71b90}, {&(0x7f0000001240)="f7c20d90c693807c4b44b90aa977dc62cc96e4ca46505b0100000000000000c8212c8d4c4f7e4d84440d11f876cd0e20363991058fdd4dc28e4b8e3214625501010000000000000088965cb0ff0cfcfef3fa0914c1a63a386e", 0x59, 0x7}, {&(0x7f00000012c0)="0fe8f1c5163d23a0a060dcf478d40d5941d4fe8337501b2cb1ea811ef33116515836dbc45b8cbbbde33e71a4a25a89b71bb860e626d77616887d2cd4531cb02f2875f9d68f72df7b288bfc6f090d890ea7d200eaac2b2cf657fb212e37bf3dc80b37078d5ebc4d78b14b48f06b2d6136b24468b55f3a4af3cb4812f4e457ea45a51c5ad368bc6a8c80b860aee2dcdd3a24501ba31778bf0dea27582b8c0d5c6a57904a1af4229b2266dde4113f498b9d0a75232115640a67e9d39562573c3441df6f", 0xc2, 0x10001}], 0x40000, &(0x7f0000001540)=ANY=[@ANYBLOB="7365637572697479bea9384269643da0a721b8a6be285fa9078596373562047ec3b6d2627514b69d9025689680828487a65dffff71e82a6e1464efb6e2bc7e522050c02747950b1133577dffc08c5fcbca4580bfab09c3536a6a4778bd7e43664a1f978b12bc235a0b777daa5b9f4907303a7a1797fc9f414135ba9762559b88c90d7b720bbf3b20b8d12abae8bdfd30a6367fd63d923320965677c477b33d673e697b71176ec4860b4f5ff5fb73df9d", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='\x00', 0x180) 19:34:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c", 0x6f, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:30 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 706.097143] loop4: detected capacity change from 0 to 512 [ 706.108241] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 706.111491] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 706.112329] EXT4-fs (loop4): group descriptors corrupted! [ 706.129797] loop2: detected capacity change from 0 to 5 [ 706.161655] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 706.175137] loop6: detected capacity change from 0 to 512 19:34:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 706.218966] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 706.231585] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 706.232980] EXT4-fs (loop6): group descriptors corrupted! [ 706.238264] loop4: detected capacity change from 0 to 512 19:34:30 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 706.263187] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 706.265670] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 706.266381] EXT4-fs (loop4): group descriptors corrupted! 19:34:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c", 0x6f, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:34:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 706.370292] loop4: detected capacity change from 0 to 512 19:34:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 706.386581] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 706.394957] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 706.395831] EXT4-fs (loop4): group descriptors corrupted! 19:34:30 executing program 1: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:30 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 706.441672] loop6: detected capacity change from 0 to 512 [ 706.443644] loop2: detected capacity change from 0 to 5 [ 706.461634] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 706.465399] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:34:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 706.471974] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 706.472852] EXT4-fs (loop6): group descriptors corrupted! 19:34:30 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:39 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c", 0x6f, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:39 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:39 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:39 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x28000, 0x1b1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x1, 0x0, 0x40, 0x9}, {0x0, 0x1, 0x7f, 0x7d}]}) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73aeac930e61b3f4e51536c78342490000000000008283221e81c8ea1dc58085d21b7c4373fdf490c5f398afa5bb2d6d722b25cc11b79b09b2e80bb1b797e5327df03f78182f512c4cbe1a429f20d3d992b56e61a7d774d9a443ce93fb886aa78de7181d5a37df1f2df1cde7baa6925b93aa5b452167fb6250cb6fcdd8639ccdf0777ba0c7402a2496328dc31f2146"]) [ 714.877131] loop6: detected capacity change from 0 to 512 19:34:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 714.929912] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 714.937269] loop2: detected capacity change from 0 to 5 [ 714.941038] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 714.942516] EXT4-fs (loop6): group descriptors corrupted! [ 714.945528] loop4: detected capacity change from 0 to 512 [ 714.960236] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 714.974300] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 714.986894] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 714.988358] EXT4-fs (loop4): group descriptors corrupted! 19:34:39 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac7", 0xa7, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 715.119487] loop6: detected capacity change from 0 to 512 19:34:39 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:39 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 715.199077] loop2: detected capacity change from 0 to 5 [ 715.200975] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 715.222223] loop4: detected capacity change from 0 to 512 [ 715.228074] EXT4-fs (loop2): failed to parse options in superblock: Щ [ 715.229746] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 715.231641] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 715.232816] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 715.233634] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 715.233664] EXT4-fs (loop6): group descriptors corrupted! [ 715.235043] EXT4-fs (loop4): group descriptors corrupted! 19:34:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 715.358742] loop4: detected capacity change from 0 to 512 [ 715.367851] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 715.370449] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 715.371203] EXT4-fs (loop4): group descriptors corrupted! 19:34:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) move_mount(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x75) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:34:50 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:50 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c17", 0x70, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:50 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:34:50 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 725.872735] loop6: detected capacity change from 0 to 512 [ 725.875827] loop4: detected capacity change from 0 to 512 [ 725.884696] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 725.887212] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 725.889753] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 725.890480] EXT4-fs (loop6): group descriptors corrupted! [ 725.891752] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 725.892461] EXT4-fs (loop4): group descriptors corrupted! 19:34:50 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:34:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 725.948368] loop2: detected capacity change from 0 to 5 19:34:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 725.976423] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 726.011313] loop4: detected capacity change from 0 to 512 [ 726.015921] loop6: detected capacity change from 0 to 512 [ 726.030460] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 726.035488] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 726.036353] EXT4-fs (loop6): group descriptors corrupted! [ 726.044777] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 726.048567] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 726.049291] EXT4-fs (loop4): group descriptors corrupted! 19:34:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045430, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x28220a0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee01}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '#! '}}, {@euid_gt={'euid>', 0xee01}}, {@obj_user}]}}) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="a70e6375726974792e2321202d2d60a861ce3b8a3f995c2d53953579b3b5e2cd91443efef73a916caf3d7195bf6543090df0be053e1dcbef313523f3d1396805272ca396e10487914313704d278292983b1301f6334815ce2e025650c1f7f92dd19143491f4ccf20c2be08ff8d9752dad1c5d75fc8cc739b0f74e3ebe5646cb9c4df1bf391a28d9d66f347c62e271ff2bdd2fad2dacf9cd6fc086a8264de317a3b8052e6b53bdecd8bc933f33e661a16e93490a8d7d2c921dc5e9bcef4dfcc8f6e47852dd664f544253021fcddaf1ac1a0c4e4ae765de2f9b2f823a128ce75248c85a01da78e0ae93d2b1241cbab98d23a75c469ea6ca3dc149720614de56a714e4d62f94ebb985cf68ae0f2b58de36b49e1e0ac1b6dde7fefeed5e86828726f9b88d0066dc769cb06ce480964f07a09d9d48b555f5b4a4546e1a0e9ed7e99b56a0e78e1ec28b677e194e1b8d85fb805dcc54313344c44e4ab4b6b988d91200d0d99"]) 19:34:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c17", 0x70, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 726.221209] loop2: detected capacity change from 0 to 5 [ 726.266706] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:35:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c17", 0x70, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 741.135283] loop6: detected capacity change from 0 to 512 [ 741.142165] loop4: detected capacity change from 0 to 512 19:35:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:05 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fspick(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r2, 0x80045430, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r1, r0, r2], 0x3) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x2) chdir(&(0x7f0000000000)='./file0\x00') removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='x\t \x00\x00\x00\x00\x00\x00\x00\x00\x00']) 19:35:05 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:05 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:05 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:05 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 741.146749] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 741.149714] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 741.150426] EXT4-fs (loop6): group descriptors corrupted! [ 741.153726] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 741.158828] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:35:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 741.211030] loop2: detected capacity change from 0 to 5 19:35:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x880000, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 741.242824] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 741.261339] loop6: detected capacity change from 0 to 512 19:35:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {0x0, 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 741.279747] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 741.283083] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 741.283809] EXT4-fs (loop6): group descriptors corrupted! 19:35:05 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 741.309470] loop4: detected capacity change from 0 to 512 [ 741.321890] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 741.327348] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 741.328087] EXT4-fs (loop4): group descriptors corrupted! 19:35:05 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {0x0, 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 741.395499] loop6: detected capacity change from 0 to 512 [ 741.411155] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib 19:35:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761", 0x8c, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 741.421790] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 741.422510] EXT4-fs (loop6): group descriptors corrupted! 19:35:05 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:05 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 741.469765] loop4: detected capacity change from 0 to 512 [ 741.484767] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 741.497176] loop2: detected capacity change from 0 to 5 [ 741.499324] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 741.500064] EXT4-fs (loop4): group descriptors corrupted! 19:35:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:05 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000380)={0x5, &(0x7f0000000280)=[{0x2, 0x8, 0x26, 0xfffffff8}, {0x6, 0x7f, 0x89, 0x9}, {0x1, 0x6, 0x81, 0x9}, {0x1ff, 0x7, 0x9, 0x2}, {0xc, 0x8, 0x4, 0xe6}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045430, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r2, 0x80045430, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000440)={r3, 0x2, r0, 0x401}) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000240)={0x400, 0x1f, 0x1, 0x200, 0x40, "b42328ed95b09f30cb42621e845d1961f272c8", 0x3, 0x200}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r4, 0x80045430, 0x0) pread64(r4, &(0x7f0000000300)=""/70, 0x46, 0x100000000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r5, 0x80045430, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0xc008}, {r4}, {r5}], 0x3, &(0x7f0000000080)={0x77359400}, &(0x7f0000000140)={[0x12]}, 0x8) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, 0x0, 0x2000, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='securit|.#! '], 0x0, 0x0, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 741.522864] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 741.554152] loop6: detected capacity change from 0 to 512 [ 741.565934] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 741.568871] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 741.569600] EXT4-fs (loop6): group descriptors corrupted! 19:35:05 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:05 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {0x0, 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761", 0x8c, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:06 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 741.671434] loop4: detected capacity change from 0 to 512 [ 741.679955] loop6: detected capacity change from 0 to 512 [ 741.686467] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 741.691363] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 741.692615] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 741.693344] EXT4-fs (loop4): group descriptors corrupted! [ 741.697488] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 741.698267] EXT4-fs (loop6): group descriptors corrupted! [ 741.706718] loop2: detected capacity change from 0 to 5 [ 741.749014] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:35:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 741.819890] loop4: detected capacity change from 0 to 512 [ 741.855336] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 741.864313] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 741.865929] EXT4-fs (loop4): group descriptors corrupted! 19:35:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045430, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x8000, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_L}, {@cache_mmap}, {@aname={'aname', 0x3d, '#! '}}, {@aname={'aname', 0x3d, '&\\'}}, {@access_uid={'access', 0x3d, 0xee00}}], [{@appraise}]}}) 19:35:18 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761", 0x8c, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:18 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:18 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:18 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 753.871880] loop4: detected capacity change from 0 to 512 [ 753.880689] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 753.884138] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 753.885208] EXT4-fs (loop4): group descriptors corrupted! 19:35:18 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 753.924657] loop2: detected capacity change from 0 to 5 [ 753.941091] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 753.946477] loop6: detected capacity change from 0 to 512 [ 753.949950] 9pnet_fd: Insufficient options for proto=fd 19:35:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 753.970766] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 753.977813] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 753.978663] EXT4-fs (loop6): group descriptors corrupted! [ 753.979529] 9pnet_fd: Insufficient options for proto=fd [ 754.011104] loop4: detected capacity change from 0 to 512 [ 754.024832] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib 19:35:18 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 754.028184] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 754.028981] EXT4-fs (loop4): group descriptors corrupted! 19:35:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e", 0x9a, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:18 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000540)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag}, {@nodevmap}], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, r1}}]}}) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000240)="a5c1d41f59daa0686b5e40d39fa85f63cd5a30e7edf620c1973e2c75ebaa1bc1acadf089aeaed75378c6f9cc37b71230764fa155a6b5a448310e8f7420888c91575152b670bd7de9fec941a81d7aa0f9b090a2fe641a58ae777fb493b188bcd04f592ea60991e55400161a020bae64d373e3cdde031d2647c1226fe84f2875e90e0e4aad62494c018c2d7dd80faf2ce2dfae7c8dcccfef410999386b233394dd670316eae30f7af473d27b398d8f0191b6185b29d95a3b1e0af08ed756384fa61d0dd9b2c6a844f38d0a119b2c73a538f532362a", 0xd4, 0x7}, {&(0x7f0000000340)="4ff6b0e3d34d85d9ea80115633b06651cc3317377638235c51003b1578bd83f57cd5fcfffaae62900e2df4f504227af470b51edb4f1cb839d8b58dd3ef21375424554704b999141b2cd74e96aefaee6342f39a880a421f5dcbbef54baaa1dedf1547851a6cf1601a0216a76a8d929719d577e88b4e97dccae4081151fa29d8979740747e7d817d5d1726b8b6bd977a4fec017d70196b276bbb585878487ecb9967d8770d90da440e543a28eca857693714095036d1682ba92adc491658afa46e944f199c4edd94a35eb04b92fade84d4d9b92861fb10c7d7bae58b16", 0xdc, 0xcbbd}], 0x112a801, &(0x7f0000000440)={[{}, {'#! '}, {'#! '}, {}], [{@subj_role={'subj_role', 0x3d, '-['}}, {@obj_type={'obj_type', 0x3d, '#! '}}, {@subj_role={'subj_role', 0x3d, '#! '}}, {@dont_measure}, {@fsmagic={'fsmagic', 0x3d, 0x80000000}}]}) [ 754.157439] loop4: detected capacity change from 0 to 512 [ 754.170677] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 754.172775] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 754.173509] EXT4-fs (loop4): group descriptors corrupted! [ 754.190412] loop6: detected capacity change from 0 to 512 [ 754.195122] loop2: detected capacity change from 0 to 5 [ 754.214319] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 754.215927] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 754.225357] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 754.226810] EXT4-fs (loop6): group descriptors corrupted! 19:35:28 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e", 0x9a, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761", 0x8c, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:28 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:35:28 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 763.810460] loop6: detected capacity change from 0 to 512 [ 763.824420] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 763.829162] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 763.829906] EXT4-fs (loop6): group descriptors corrupted! [ 763.863140] loop2: detected capacity change from 0 to 5 [ 763.909308] loop4: detected capacity change from 0 to 512 19:35:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:28 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 763.911788] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 763.935962] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 763.958818] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 763.960508] EXT4-fs (loop4): group descriptors corrupted! 19:35:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)={0x5c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x34, 0x8, 0x0, 0x1, [{0xfffffffffffffefe, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x5c}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000380)={0x74, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_batadv\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:var_auth_t:s0\x00'}]}, 0x74}}, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000080)='security.', &(0x7f0000000140)='security.', &(0x7f0000000400)='#% \xb7\xf4*\x9c\x15.\xea\xf8Q\x1b1\xe3\\\x83\xa0\xe8\xd3\x81\xb2\x88\x87\xde\xd8\\Z\xeb\x95\x13\x1dp\"A\x83\x060X\xd3\xc1\xd4\a\xccC\xfb\xf6\xca\x19\xa9J\x81]rs{\xd6LH\xba\xeb', &(0x7f0000000280)='#! ', &(0x7f00000002c0)='-&#\x00', &(0x7f0000000240)='#! '], &(0x7f00000004c0)=[&(0x7f0000000380)='security.', &(0x7f00000003c0)='\x00', &(0x7f0000000680)='[[/\x00W\xb9C7\xd4\xc9_\xce\xd1\xfd\xf9\xed@\xe4\xfb \xd0\x8c\x93Fy\x9b#\xaa\xca\xf3\x91\x12H\x82\x04\xefDh\xc0\xf5\xd7\x1b\x18\xc1hx\xfa/\xda\xe9\xea\x12\xcfr\xe8z\x83V\xa2\xa8\xbc\x00\x00\x00[Su#\xad98\xc4\x8aN\x81\xe99\xe4\xac\xef\bn\xfdQ\xc5\xd3\xa3=4YgXKi\xf81D\xcf\x1d\xc5G\x9d\x06\xfcJ\x16\x1aZ\f\xe7\xc3?U%\xb4\xb9\xef\xc3\x88\xe4\x88\v4\x16\xae\x87\xac3_\a\xab\x80\xd9\x02}\xfc\xb6\xbe\xee\xa0\xb0o_\xf9\x82d~\xeac=\xbe\xdb\x95\x7f\x8e\x1f\xd0\xd7\xe4\xbc\xb5\xb7\xc5>\x15\x16{\xf0\rt\xa3U{\xf7\xd5\xee_\x10\xa0\xf3\xae\xb16\xcd\x83\xcbG\xe4\xc4>L1\xbd\xa1W*W\x88\x19\xd9\xcd\x9c\xab4\xb9L\x11\x0e*2p\xb3\xfe\x9a\xfb{\xf8\xf1\xf9R\xd3\xc38\xb6\x97\xcb\xe2\x93\x06\b@\xe5)7\xe6P\xba<\x10l\xb5\xfa\xfe\xc6', &(0x7f0000000440)='#! ', &(0x7f0000000480)='-^*\x00']) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r4, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x214}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x60, r1, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x18}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}]}, 0x60}, 0x1, 0x0, 0x0, 0x4004801}, 0x0) [ 764.014738] loop6: detected capacity change from 0 to 512 [ 764.031124] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 764.037938] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock 19:35:28 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 764.039487] EXT4-fs (loop6): group descriptors corrupted! [ 764.090006] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.3'. [ 764.148050] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.3'. 19:35:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:40 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:40 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e", 0x9a, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:40 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="7365639b622f3f7e71167572"]) 19:35:40 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:40 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 776.292704] loop6: detected capacity change from 0 to 512 [ 776.307993] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 776.316151] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 776.316930] EXT4-fs (loop6): group descriptors corrupted! [ 776.352839] loop4: detected capacity change from 0 to 512 [ 776.358932] loop2: detected capacity change from 0 to 5 [ 776.375842] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 776.379149] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 776.383725] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 776.385193] EXT4-fs (loop4): group descriptors corrupted! 19:35:51 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:51 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) 19:35:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:51 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:51 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 787.173165] loop6: detected capacity change from 0 to 512 19:35:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) copy_file_range(r0, 0x0, r1, &(0x7f0000000080)=0x1, 0x8, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 787.192191] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 787.196787] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 787.197483] EXT4-fs (loop6): group descriptors corrupted! [ 787.212242] loop4: detected capacity change from 0 to 512 [ 787.223252] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 787.226039] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 787.226747] EXT4-fs (loop4): group descriptors corrupted! 19:35:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 787.279051] loop2: detected capacity change from 0 to 5 [ 787.304746] EXT4-fs (loop2): failed to parse options in superblock: [ 787.305308] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:35:51 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:51 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) 19:35:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 787.340194] loop6: detected capacity change from 0 to 512 19:35:51 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="7365635272697479bf4e21206b60ca793c32b46a7abe92ca5e55f24807cd8486ad4c682d154e6da672e45d26a8e3c327eb96a9b32e23bd30efe6bd379630cf9860f189a5f0f8a200e878c1a1389e216c7796bb518f41aca1f5"]) [ 787.359370] EXT4-fs (loop6): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 787.361572] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 787.362283] EXT4-fs (loop6): group descriptors corrupted! 19:35:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e", 0x9b, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:35:51 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:51 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 787.419370] loop4: detected capacity change from 0 to 512 19:35:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 787.435074] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib 19:35:51 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 787.440810] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 787.441483] EXT4-fs (loop4): group descriptors corrupted! [ 787.519965] loop6: detected capacity change from 0 to 512 19:35:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)=@known='trusted.syz\x00', 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 787.545519] loop2: detected capacity change from 0 to 5 19:35:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 787.556707] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 [ 787.570774] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:35:51 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:51 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) 19:35:52 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:35:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 787.699879] loop4: detected capacity change from 0 to 512 [ 787.724501] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 787.736734] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 787.738215] EXT4-fs (loop4): group descriptors corrupted! [ 787.805087] loop6: detected capacity change from 0 to 512 [ 787.833954] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 19:36:05 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:05 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e", 0x9b, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000000), 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r2, 0x80045430, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={0x0, 0x3, r2, 0x7ff, 0x80000}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0x7, 0x210041) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000240)) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'osx.', 'security.'}) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:36:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:05 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:05 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 801.152176] loop2: detected capacity change from 0 to 5 [ 801.159665] loop4: detected capacity change from 0 to 512 [ 801.160803] loop6: detected capacity change from 0 to 512 [ 801.183598] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 801.184397] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 801.187776] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 [ 801.195496] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 801.196964] EXT4-fs (loop4): group descriptors corrupted! 19:36:05 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:05 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e", 0x9b, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000000), 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 801.418901] loop2: detected capacity change from 0 to 5 19:36:05 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 801.448359] loop6: detected capacity change from 0 to 512 19:36:05 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 801.463109] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 801.473092] loop4: detected capacity change from 0 to 512 [ 801.491033] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 [ 801.497364] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 801.504715] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 801.506341] EXT4-fs (loop4): group descriptors corrupted! 19:36:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:16 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:16 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x2, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="737906560932bec63c4bf7a522028b63d22e232120"]) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') [ 812.447283] loop2: detected capacity change from 0 to 5 [ 812.456855] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 812.504179] loop4: detected capacity change from 0 to 512 [ 812.508833] loop6: detected capacity change from 0 to 512 [ 812.521200] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 812.525825] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 812.526683] EXT4-fs (loop4): group descriptors corrupted! [ 812.530975] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 19:36:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:26 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='sec2rity.#! '], 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:36:26 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 821.720791] loop6: detected capacity change from 0 to 512 [ 821.726979] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 19:36:26 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 821.770744] loop2: detected capacity change from 0 to 5 [ 821.790150] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 821.793418] loop4: detected capacity change from 0 to 512 [ 821.808488] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 821.815213] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 821.815963] EXT4-fs (loop4): group descriptors corrupted! 19:36:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:26 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="9e066375726974792e2321422062a1c138c4eae9c52cacc2654fe58adc50ee332085df8001b0f4a917e20ca0e1bdea80dc58f9190b48c03dc45c956e004edd8b2a61316e25101043f7be0ee0ccb52698d041631883b4546ef64b8edf37d335515c771aaaf9551d493e16dbf548cf328917292efd33d1efeff101625215947c935f00f7eb2842fdcc85ec4407dd5fb18af5e14040ec889022dca70d7a65d1b456b23f60868e5b1c21fcf874f481dfb37580539aeb49682811340762e6e0f2009cfeb2364594bf47b4d7e3b2a9813b454ce637ac11da880f27fd4a52020ee6600e0a4e24d48cb75bb6119f6ac27ff886948148af8c6860da1d85"], 0x0, 0x0, 0x2) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 821.939907] loop4: detected capacity change from 0 to 512 19:36:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27e", 0xa0, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 821.958209] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 821.966985] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 821.967720] EXT4-fs (loop4): group descriptors corrupted! [ 821.972145] loop6: detected capacity change from 0 to 512 19:36:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 822.002955] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 [ 822.043876] loop2: detected capacity change from 0 to 5 [ 822.059939] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:36:36 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:36 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27e", 0xa0, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:36 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'btrfs.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:36:36 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 831.928976] loop6: detected capacity change from 0 to 512 [ 831.953519] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 [ 831.957316] loop2: detected capacity change from 0 to 5 [ 831.960061] loop4: detected capacity change from 0 to 512 [ 831.979461] EXT4-fs (loop4): failed to parse options in superblock: ЩNS D]Ux>|*!\aib [ 831.991248] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 831.992606] EXT4-fs (loop4): group descriptors corrupted! [ 832.020455] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:36:36 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:36 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:36 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:36 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socket$inet6_tcp(0xa, 0x1, 0x0) clone3(&(0x7f0000000480)={0x4800, &(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000300), {0x8}, &(0x7f0000000340)=""/99, 0x63, &(0x7f00000003c0)=""/115, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045430, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r2, 0x80045430, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0x11, &(0x7f0000000000), 0x4) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000000)={0x0, 0x2, r0, 0x7}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x2, 0x0, 0x0, 0xe7839331f0152ad7, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:36:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27e", 0xa0, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 832.200773] loop6: detected capacity change from 0 to 512 19:36:36 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 832.271368] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 [ 832.293169] loop4: detected capacity change from 0 to 512 [ 832.319948] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 19:36:36 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:36 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:36 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x44894) shutdown(r0, 0x1) [ 832.329718] loop2: detected capacity change from 0 to 5 [ 832.362657] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:36:36 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 832.533010] loop4: detected capacity change from 0 to 512 [ 832.543107] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 19:36:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000240)='./file0\x00', 0x101, 0x3, &(0x7f0000000440)=[{&(0x7f0000000280)="016d5d858fa7ad698b0570c12a4c020f361c7d8d3902e720a76514edc350b9883b69320972d7a23ca86984c60a7f255d97a38bf2a19f5e63afc6804b96f0a9393dc2493317485d79526933535cd31f74d0505c43a9656e10de0367876609297a012032a7310f993e5da5ce4b03d73b1679866eae00cce25005d6500a63d7c31f3bad07bb0416f8e5cb7fe7b11ea71f485d89ee7ba4e63ed52a4bfcecca168f84d082055cdba9f970ccc241826fbca55a7908dd250c188b6cf8abc907330f3a779a6e8e6d42691f391f", 0xc9, 0x400}, {&(0x7f0000000380)="f28fc8cab794ee818413a60d18cb1e76", 0x10, 0x4}, {&(0x7f00000003c0)="70727b73114ae1e4eb38ebdbeaf7b167a7242a86edecdb25e99cb5131d2f0175c2f9bb0ff8ab4ca47d05c16e97cb4845b69828c437e77f0ae2a5ad107feddb4be686c55bf7aea99157437a395a60b28a7c050d170879", 0x56, 0x10000}], 0x2300000, &(0x7f00000004c0)={[{@huge_always}, {@huge_always}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x32, 0x34, 0x39, 0x74, 0x74]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@dont_measure}, {@seclabel}, {@fowner_gt={'fowner>', r0}}, {@subj_role={'subj_role', 0x3d, 'security.'}}]}) 19:36:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:45 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:45 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:45 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:45 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x44894) shutdown(r0, 0x1) 19:36:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c", 0x6f, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 841.306302] loop6: detected capacity change from 0 to 512 [ 841.317003] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:36:45 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 841.353789] loop4: detected capacity change from 0 to 512 [ 841.375191] loop2: detected capacity change from 0 to 4 [ 841.399819] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 841.402999] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 19:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045430, 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, 'security.'}, {0x20, 'security.'}, {0x20, '-\''}], 0xa, "c23e831745c9bd92eabc5cae87713ef56dd4daba1391841e232d31cc03324b2d7ecc77d8b6a30645519e50a190c9d6c66033fa"}, 0x55) 19:36:55 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:55 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x44894) shutdown(r0, 0x1) 19:36:55 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:55 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 850.966792] loop2: detected capacity change from 0 to 4 19:36:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c", 0x6f, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 850.968169] loop4: detected capacity change from 0 to 512 [ 850.980171] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 850.986851] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 [ 851.017345] loop6: detected capacity change from 0 to 512 [ 851.036848] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 851.110989] loop2: detected capacity change from 0 to 4 [ 851.112496] loop4: detected capacity change from 0 to 512 19:36:55 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 851.127054] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) [ 851.129900] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 19:36:55 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c", 0x6f, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:55 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:55 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 851.177931] loop6: detected capacity change from 0 to 512 [ 851.191218] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:36:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00000000f1f004336a29a3b4"]) 19:36:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 851.252620] loop2: detected capacity change from 0 to 5 19:36:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac7", 0xa7, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 851.266146] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:36:55 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:36:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 851.327796] loop6: detected capacity change from 0 to 512 19:36:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x4, 0x0, 0x8, 0xba5b}, {0x7, 0x4, 0x9, 0x2}, {0x4, 0x9, 0x1, 0x7}, {0x3b74, 0x6, 0x3f, 0xdde}]}) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='security! ']) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140)=@ng={0x4, 0xb, "ba9ba00b596d10f665d20072"}, 0xe, 0x3) [ 851.341116] EXT4-fs (loop6): failed to parse options in superblock: Щ [ 851.345176] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:36:55 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 851.365740] loop4: detected capacity change from 0 to 512 [ 851.393381] loop2: detected capacity change from 0 to 5 19:36:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c17", 0x70, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:36:55 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 851.406562] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 851.412140] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 [ 851.418817] audit: type=1326 audit(1761421015.771:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7881 comm="syz-executor.3" exe="/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9df200db19 code=0x0 [ 851.466802] loop6: detected capacity change from 0 to 512 [ 851.486891] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:37:03 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:03 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:37:03 executing program 3: ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f0000000340)={&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000240)=""/193, 0xc1}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x40, 0x2}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="77656375726974792e23512b0c212063b08b76a0bb31b94900b8b0bc43f2138b1b32aeaceb90238eaba8175763ac2a4372000e187951ac1b6200b1cc5d9e5bde61432eaf1251822e28b7ca39e98ef1a25260"], 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f0000000080)) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:37:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c17", 0x70, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:03 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:03 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 859.156712] loop2: detected capacity change from 0 to 5 [ 859.157278] loop6: detected capacity change from 0 to 512 [ 859.169323] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 859.169819] audit: type=1326 audit(1761421023.524:22): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7900 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9df200db19 code=0x0 [ 859.172106] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:37:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c17", 0x70, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 859.234665] loop4: detected capacity change from 0 to 512 [ 859.255482] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 [ 859.271277] loop6: detected capacity change from 0 to 512 [ 859.274012] loop2: detected capacity change from 0 to 5 [ 859.281220] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 859.283807] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:37:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761", 0x8c, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:03 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x44894) shutdown(r0, 0x1) 19:37:03 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 859.372198] loop6: detected capacity change from 0 to 512 [ 859.375687] loop2: detected capacity change from 0 to 5 19:37:03 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 859.391308] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 859.393234] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 859.476800] loop4: detected capacity change from 0 to 512 [ 859.487938] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 [ 859.996011] audit: type=1326 audit(1761421024.353:23): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7900 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9df200db19 code=0x0 19:37:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:13 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="73656375726974792e232120049c922ed71c9b8b6b7b25d49d4642dcd90cd93ddd5a895d0b55ad71755c2948dfefa542622bdfe448443458647549967948ec4bf2fa25436f6e1982c7b91bdcce83f268f0e66b62c6251305aa6ab507"]) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0xc000, 0x80, 0x9}, 0x18) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1100) 19:37:13 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:37:13 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:13 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x44894) shutdown(r0, 0x1) 19:37:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761", 0x8c, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 869.147612] loop4: detected capacity change from 0 to 512 [ 869.159955] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 [ 869.184743] loop2: detected capacity change from 0 to 5 [ 869.187957] loop6: detected capacity change from 0 to 512 [ 869.201040] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 869.211793] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c", 0x6f, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x29) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:37:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761", 0x8c, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:24 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:24 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:24 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x44894) shutdown(r0, 0x1) 19:37:24 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 880.672728] loop6: detected capacity change from 0 to 512 [ 880.676356] loop2: detected capacity change from 0 to 5 [ 880.680282] loop4: detected capacity change from 0 to 512 [ 880.702029] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 880.704030] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 880.704899] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:37:25 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:25 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:37:25 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:25 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x11, &(0x7f0000000000), 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="110000002e2f66696c653000"]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r4, 0x6, 0x11, &(0x7f0000000000), 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000140)) 19:37:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e", 0x9a, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c", 0x6f, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:25 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 880.954912] loop2: detected capacity change from 0 to 5 [ 880.974084] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:37:25 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 881.010123] loop6: detected capacity change from 0 to 512 [ 881.011064] loop4: detected capacity change from 0 to 512 [ 881.033670] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 881.034207] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:37:25 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:37:25 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c", 0x6f, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x7fffffff, 0xb15}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={0x0, 0x3, r0, 0x1ff, 0xec2d3571de71f14b}) ioctl$TIOCGPKT(r0, 0x80045430, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, '\x00@\xea'}, {0x20, '-*&-'}, {0x20, '%'}], 0xa, "05e0bdbf84cec33a3629d16b184ef993cade14d42ba3dc82fa2018290823863bcf79b1"}, 0x39) [ 881.225747] loop2: detected capacity change from 0 to 5 [ 881.253941] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 881.290980] loop4: detected capacity change from 0 to 512 [ 881.329130] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:37:37 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:37:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac7", 0xa7, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:37 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x5, &(0x7f0000000140)=[{0xff, 0x5, 0x6, 0x80}, {0x20, 0x4, 0x4, 0x6}, {0x4, 0x0, 0x1d, 0x6b7}, {0x1, 0x0, 0x7, 0x27}, {0x7ff, 0xff, 0x1, 0xca}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)={0x0}) r2 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r1, 0x0, r2, 0x100}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:37:37 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e", 0x9a, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:37 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:37 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:37 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 893.571955] loop4: detected capacity change from 0 to 512 [ 893.582962] loop6: detected capacity change from 0 to 512 [ 893.613267] EXT4-fs (loop4): failed to parse options in superblock: Щ [ 893.619051] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 893.623902] loop2: detected capacity change from 0 to 5 19:37:37 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 893.633724] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 893.638152] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:37:38 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:46 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x60, 0x0, 0x1001c, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x1) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="736563036562a2959c2a240b110894186030a9c1fddb2b3cd63400"]) 19:37:46 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:46 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:46 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c17", 0x70, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e", 0x9a, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 902.318865] loop4: detected capacity change from 0 to 512 [ 902.320514] loop6: detected capacity change from 0 to 512 [ 902.329811] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 902.334008] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 902.345666] loop2: detected capacity change from 0 to 5 [ 902.357565] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:37:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c17", 0x70, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:46 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 902.455128] loop6: detected capacity change from 0 to 512 [ 902.459412] loop4: detected capacity change from 0 to 512 [ 902.468592] EXT4-fs (loop6): failed to parse options in superblock: [ 902.476238] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 902.484954] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:37:46 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e", 0x9b, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="8965636a"]) 19:37:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c17", 0x70, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:46 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 902.566350] loop2: detected capacity change from 0 to 5 [ 902.573051] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 902.583446] loop6: detected capacity change from 0 to 512 [ 902.586706] loop4: detected capacity change from 0 to 512 [ 902.595184] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 902.596742] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:37:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761", 0x8c, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00') 19:37:57 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:57 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:57 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:57 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e", 0x9b, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 912.855157] loop2: detected capacity change from 0 to 5 [ 912.862876] loop6: detected capacity change from 0 to 512 [ 912.868671] EXT4-fs (loop2): invalid first ino: 0 [ 912.875421] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 912.890662] loop4: detected capacity change from 0 to 512 [ 912.919807] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:37:57 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:57 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:37:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e", 0x9b, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 913.011071] loop2: detected capacity change from 0 to 5 [ 913.021823] loop6: detected capacity change from 0 to 512 [ 913.036972] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 913.041268] EXT4-fs (loop2): invalid first ino: 0 19:37:57 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:57 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:57 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:37:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761", 0x8c, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 913.135359] loop4: detected capacity change from 0 to 512 [ 913.149158] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x3, 0x13, 0x0, 0x7fff0000}]}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x6, &(0x7f0000000000)=[{0x7ff, 0x1, 0x80}, {0x8, 0x20, 0x6, 0x1}, {0x2, 0x3f, 0xff, 0x20}, {0x5f, 0x3, 0x4}, {0x7fff, 0x7, 0x8, 0x5}, {0x8f97, 0x5, 0x9, 0x7}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045430, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0x11, &(0x7f0000000000), 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000100)={r4, 0x2, r0, 0x6, 0x80000}) r5 = fcntl$dupfd(r0, 0x0, r1) r6 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r5, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r6}, './file1\x00'}) getdents(r7, &(0x7f0000000300)=""/231, 0xe7) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="73656375ef8363725b7a6eb6f6c08a506c726974cf97f69b8d79d38e2120"], 0x0, 0x0, 0x0) getdents(r7, &(0x7f0000000240)=""/123, 0x7b) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:38:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:05 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:05 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:05 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:05 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761", 0x8c, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 921.650599] loop2: detected capacity change from 0 to 5 [ 921.661301] EXT4-fs (loop2): invalid first ino: 0 [ 921.669766] loop6: detected capacity change from 0 to 512 19:38:06 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:06 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 921.693948] loop4: detected capacity change from 0 to 512 19:38:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 921.705210] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 921.710935] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 921.765697] loop2: detected capacity change from 0 to 5 19:38:06 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e", 0x9a, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 921.791647] EXT4-fs (loop2): failed to parse options in superblock: [ 921.792225] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:38:06 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:06 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:38:06 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100", 0x4e, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 921.876399] loop4: detected capacity change from 0 to 512 19:38:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 921.892958] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:06 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 921.933283] loop2: detected capacity change from 0 to 5 [ 921.949570] EXT4-fs (loop2): invalid first ino: 0 19:38:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e", 0x9a, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:06 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 921.996028] loop4: detected capacity change from 0 to 512 [ 922.006109] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 922.012259] loop6: detected capacity change from 0 to 512 [ 922.035514] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:15 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:15 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:15 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100", 0x4e, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000000), 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r4, 0x6, 0x11, &(0x7f0000000000), 0x4) getsockopt$inet6_tcp_int(r4, 0x6, 0x17, &(0x7f0000000280), &(0x7f0000000300)=0x4) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000380)={r2, 0x0, 0xffffffffffffffff, 0x200}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r5, 0x80045430, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={r2, 0x2, r5, 0x3f}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x7, 0x80, 0x4, 0x3}, {0x3f, 0xb7, 0xb9, 0x400}, {0x4, 0x20, 0x0, 0x5}, {0xff, 0xfc, 0x6, 0xfff}]}) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7c4d03000000000008002120"], 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000340)={0x5, &(0x7f0000000240)=[{0x31, 0xb, 0x2, 0xa3b}, {0xf5, 0x6, 0x2, 0x8}, {0x9, 0x6, 0x4}, {0x5, 0x5, 0xd7, 0x1}, {0x20, 0xd7, 0x0, 0x7fffffff}]}) 19:38:15 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e", 0x9a, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 931.632100] loop2: detected capacity change from 0 to 5 [ 931.633104] loop4: detected capacity change from 0 to 512 [ 931.643097] EXT4-fs (loop2): invalid first ino: 0 [ 931.643822] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 931.691295] loop6: detected capacity change from 0 to 512 19:38:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100", 0x4e, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 931.724394] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:16 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:16 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 931.781219] loop4: detected capacity change from 0 to 512 [ 931.791923] EXT4-fs (loop4): failed to parse options in superblock: [ 931.796443] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 931.801092] loop2: detected capacity change from 0 to 5 [ 931.860767] EXT4-fs (loop2): invalid first ino: 0 19:38:24 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:24 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)=@random={'osx.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:38:24 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:24 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27e", 0xa0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e", 0x9b, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 939.868474] loop4: detected capacity change from 0 to 512 [ 939.880335] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 939.908810] loop2: detected capacity change from 0 to 5 [ 939.927941] loop6: detected capacity change from 0 to 512 [ 939.933075] EXT4-fs (loop2): invalid first ino: 0 19:38:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1f}, {0x6, 0x20, 0xf0, 0x20}, {0x81, 0x6, 0x9, 0xcc}]}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004140)=[{{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000001740)=[{&(0x7f00000002c0)=""/15, 0xf}, {&(0x7f0000000300)=""/159, 0x9f}, {&(0x7f00000003c0)=""/49, 0x31}, {&(0x7f0000000400)=""/231, 0xe7}, {&(0x7f0000000500)=""/178, 0xb2}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/91, 0x5b}, {&(0x7f0000001640)=""/211, 0xd3}], 0x8, &(0x7f00000017c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x118}}, {{&(0x7f0000001900), 0x6e, &(0x7f0000001e40)=[{&(0x7f0000001980)=""/197, 0xc5}, {&(0x7f0000001a80)=""/246, 0xf6}, {&(0x7f0000001b80)=""/202, 0xca}, {&(0x7f0000001c80)=""/161, 0xa1}, {&(0x7f0000001d40)=""/106, 0x6a}, {&(0x7f0000001dc0)=""/94, 0x5e}], 0x6, &(0x7f0000001ec0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x60}}, {{0x0, 0x0, &(0x7f00000040c0)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000002f40)=""/149, 0x95}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000004000)=""/45, 0x2d}, {&(0x7f0000004040)=""/94, 0x5e}], 0x5}}], 0x3, 0x40002101, &(0x7f0000004200)) linkat(r0, &(0x7f0000000140)='./file1\x00', r1, &(0x7f0000004240)='./file0\x00', 0x1400) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:38:24 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e", 0x9b, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 939.964688] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:24 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 940.008084] loop4: detected capacity change from 0 to 512 19:38:24 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 940.019045] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:24 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:24 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0000000003c48c0600"/18]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x11, &(0x7f0000000000), 0x4) renameat2(r0, &(0x7f0000000000)='.\x00', r2, &(0x7f0000000080)='./file0\x00', 0x1) [ 940.139247] loop2: detected capacity change from 0 to 5 [ 940.152641] EXT4-fs (loop2): invalid first ino: 0 19:38:33 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27e", 0xa0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e", 0x9b, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27e", 0xa0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:33 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045430, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000000)={&(0x7f0000000240)=""/66, 0x42}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:38:33 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 949.228896] loop2: detected capacity change from 0 to 5 [ 949.231010] loop4: detected capacity change from 0 to 512 [ 949.239046] EXT4-fs (loop2): invalid first ino: 0 [ 949.241514] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:33 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 949.273921] loop6: detected capacity change from 0 to 512 19:38:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 949.314852] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:33 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:33 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:38:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:33 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = fork() ptrace(0x10, r1) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000240)=[{}, {&(0x7f0000000080)="54fdf1f65b1fb75bb7813bb923e7b4ccb315caafa4a6", 0x16}], 0x2, &(0x7f0000000280)=[@rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee00}}}], 0x48}}], 0x1, 0x4014) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 949.381211] loop2: detected capacity change from 0 to 5 [ 949.397581] EXT4-fs (loop2): unsupported inode size: 0 [ 949.398069] EXT4-fs (loop2): blocksize: 2048 [ 949.421844] loop4: detected capacity change from 0 to 512 19:38:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27e", 0xa0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 949.450681] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:33 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:33 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 949.517651] loop2: detected capacity change from 0 to 5 [ 949.531477] EXT4-fs (loop2): unsupported inode size: 0 [ 949.532019] EXT4-fs (loop2): blocksize: 2048 19:38:33 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 949.550995] loop6: detected capacity change from 0 to 512 19:38:33 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 949.580053] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:44 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:44 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x8, 0x7fff0000}]}) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="736563757269742e23212000d6cc680d9b9cfe2991d4030001040000000020fd88fe8befe7384616f127663d92c9c784005fa753b2362cbc1ec7b7bac472d0f74b2cfbb6c8283b094bd1e86f40f6bb48cdda1929a9f0fd6d69927fc89430f6b808af778d2608ebd8254a467760556b2e6bf9ae23a3000000000000"], 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="7365e987ac6216d670592a80690a8e0b47c1bdbc6eeff104"]) 19:38:44 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:44 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 960.193949] loop6: detected capacity change from 0 to 512 [ 960.206974] loop4: detected capacity change from 0 to 512 [ 960.208891] loop2: detected capacity change from 0 to 5 [ 960.217723] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 [ 960.230019] EXT4-fs (loop2): unsupported inode size: 0 [ 960.230876] EXT4-fs (loop2): blocksize: 2048 [ 960.268083] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:38:44 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:44 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:44 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:44 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 960.453047] loop2: detected capacity change from 0 to 5 [ 960.476413] EXT4-fs (loop2): failed to parse options in superblock: [ 960.477812] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (1 blocks) 19:38:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:56 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:56 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:56 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:56 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045430, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045430, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r0, @ANYRESDEC=r1]) 19:38:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 972.077310] loop4: detected capacity change from 0 to 512 [ 972.102657] loop6: detected capacity change from 0 to 512 [ 972.103823] loop2: detected capacity change from 0 to 5 [ 972.124264] EXT4-fs (loop2): unsupported inode size: 0 [ 972.125216] EXT4-fs (loop2): blocksize: 2048 [ 972.145898] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 972.150824] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 19:38:56 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:56 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:56 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:38:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:38:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 972.355357] loop2: detected capacity change from 0 to 5 [ 972.378247] EXT4-fs (loop2): unsupported inode size: 0 [ 972.379094] EXT4-fs (loop2): blocksize: 2048 19:39:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27e", 0xa0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69da", 0x9e, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:06 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:06 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:06 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:39:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x4, 0x0, 0x0, 0x2a10d2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 982.431253] loop2: detected capacity change from 0 to 5 [ 982.449619] EXT4-fs (loop2): unsupported inode size: 0 [ 982.450376] EXT4-fs (loop2): blocksize: 2048 [ 982.453959] loop6: detected capacity change from 0 to 512 [ 982.456404] loop4: detected capacity change from 0 to 512 [ 982.484433] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 982.504328] EXT4-fs warning (device loop6): read_mmp_block:114: Error -117 while reading MMP block 0 19:39:06 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:39:06 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:06 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e", 0x9a, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27e", 0xa0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffeff, 0x0, 0x0, 0x1290c44, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x11, &(0x7f0000000000), 0x4) mount_setattr(r0, &(0x7f0000000080)='./file0\x00', 0x19800, &(0x7f0000000140)={0x20def2a35c20c0fc, 0x4, 0x20000, {r2}}, 0x20) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r4, 0x6, 0x11, &(0x7f0000000000), 0x4) unlinkat(r4, &(0x7f0000000240)='./file0\x00', 0x200) getpeername(r1, &(0x7f00000003c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f0000000100)=0x80) [ 982.666458] loop2: detected capacity change from 0 to 5 [ 982.699163] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:39:07 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:07 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 982.772115] loop4: detected capacity change from 0 to 512 [ 982.792153] loop6: detected capacity change from 0 to 512 [ 982.822181] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 982.840401] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:39:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:17 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27e", 0xa0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:17 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:17 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="73650175726974792e232120"], 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:39:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x7fffffff, 0xb15}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={0x0, 0x3, r0, 0x1ff, 0xec2d3571de71f14b}) ioctl$TIOCGPKT(r0, 0x80045430, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, '\x00@\xea'}, {0x20, '-*&-'}, {0x20, '%'}], 0xa, "05e0bdbf84cec33a3629d16b184ef993cade14d42ba3dc82fa2018290823863bcf79b1"}, 0x39) [ 993.469289] loop6: detected capacity change from 0 to 512 [ 993.470712] loop4: detected capacity change from 0 to 512 [ 993.482333] loop2: detected capacity change from 0 to 5 [ 993.497419] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 993.502616] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 993.506870] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:39:17 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:17 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:17 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:17 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x400, 0x1) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="51bda686ed7c097273656275726974742e2352cf"]) 19:39:17 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 993.753651] loop2: detected capacity change from 0 to 5 [ 993.772862] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 993.820878] loop4: detected capacity change from 0 to 512 [ 993.828093] loop6: detected capacity change from 0 to 512 19:39:18 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x44894) shutdown(r0, 0x1) 19:39:18 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 993.861680] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 993.873462] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 19:39:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, 0x0) 19:39:18 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 993.984161] loop2: detected capacity change from 0 to 5 19:39:18 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 994.120395] loop6: detected capacity change from 0 to 512 [ 994.165791] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 994.181041] loop4: detected capacity change from 0 to 512 [ 994.206096] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 19:39:27 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, 0x0) 19:39:27 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:27 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x44894) shutdown(r0, 0x1) 19:39:27 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:27 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1003.113642] loop6: detected capacity change from 0 to 512 [ 1003.123130] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1003.124137] loop2: detected capacity change from 0 to 5 19:39:27 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1003.165126] loop4: detected capacity change from 0 to 512 19:39:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1003.206880] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 0 19:39:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, 0x0) 19:39:27 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:27 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x44894) shutdown(r0, 0x1) 19:39:27 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1003.313100] loop6: detected capacity change from 0 to 512 [ 1003.336004] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1003.371205] loop4: detected capacity change from 0 to 512 [ 1003.379877] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:39:27 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1003.423218] loop2: detected capacity change from 0 to 5 19:39:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:36 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:36 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:36 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:36 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:39:36 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1011.709473] loop6: detected capacity change from 0 to 512 19:39:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x29) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 1011.730826] loop4: detected capacity change from 0 to 512 19:39:36 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 1011.748399] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1011.753155] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:39:36 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:39:36 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:36 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1011.901763] loop4: detected capacity change from 0 to 512 [ 1011.913928] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:39:45 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:45 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:45 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000380)={0x5, &(0x7f0000000280)=[{0x2, 0x8, 0x26, 0xfffffff8}, {0x6, 0x7f, 0x89, 0x9}, {0x1, 0x6, 0x81, 0x9}, {0x1ff, 0x7, 0x9, 0x2}, {0xc, 0x8, 0x4, 0xe6}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045430, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r2, 0x80045430, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000440)={r3, 0x2, r0, 0x401}) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000240)={0x400, 0x1f, 0x1, 0x200, 0x40, "b42328ed95b09f30cb42621e845d1961f272c8", 0x3, 0x200}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r4, 0x80045430, 0x0) pread64(r4, &(0x7f0000000300)=""/70, 0x46, 0x100000000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPKT(r5, 0x80045430, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0xc008}, {r4}, {r5}], 0x3, &(0x7f0000000080)={0x77359400}, &(0x7f0000000140)={[0x12]}, 0x8) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, 0x0, 0x2000, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='securit|.#! '], 0x0, 0x0, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) 19:39:45 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:39:45 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:39:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:45 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1021.187100] loop4: detected capacity change from 0 to 512 19:39:45 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:39:45 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1021.219757] loop6: detected capacity change from 0 to 512 [ 1021.235050] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1021.239886] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:39:45 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:45 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:45 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:45 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1021.389100] loop6: detected capacity change from 0 to 512 [ 1021.404101] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:39:45 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1021.528473] loop4: detected capacity change from 0 to 512 [ 1021.537342] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:39:45 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:55 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:55 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:55 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:55 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:55 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:55 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:55 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:39:55 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1031.045101] loop6: detected capacity change from 0 to 512 [ 1031.059459] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1031.066969] loop4: detected capacity change from 0 to 512 [ 1031.082675] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:39:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:39:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1031.179514] loop6: detected capacity change from 0 to 512 [ 1031.188350] loop4: detected capacity change from 0 to 512 [ 1031.188862] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1031.193649] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:40:04 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:04 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:04 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:04 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:04 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:04 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:04 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1040.364485] loop4: detected capacity change from 0 to 512 [ 1040.375066] loop6: detected capacity change from 0 to 512 [ 1040.388063] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:40:04 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1040.432162] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:40:04 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:15 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1050.749418] loop6: detected capacity change from 0 to 512 [ 1050.753748] loop4: detected capacity change from 0 to 512 [ 1050.757302] EXT4-fs (loop6): invalid first ino: 0 [ 1050.758989] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:40:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:15 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1050.917018] loop4: detected capacity change from 0 to 512 19:40:15 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x3, &(0x7f0000000340)=[{0x6, 0x3, 0x0, 0x7fff0000}, {0x4, 0x7f, 0x7b, 0x10001}, {0x4fc, 0x4, 0x1, 0xff}]}) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '#! '}, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='security.selinux\x00', &(0x7f0000000240)=""/239, 0x11b) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'security.', '#! '}) [ 1050.930831] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1050.937381] loop6: detected capacity change from 0 to 512 19:40:15 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1051.016458] EXT4-fs (loop6): invalid first ino: 0 19:40:15 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1051.049036] loop4: detected capacity change from 0 to 512 [ 1051.061068] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:40:15 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1051.174046] loop4: detected capacity change from 0 to 512 [ 1051.188575] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:40:26 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0a994a4e38ac74e53b27fd20b44aa9de81d5df8d0d055783eaef81d9da5d87cf42a21935c61886912b90198e0be7fff622c997bc2493e2d33d00626ddf2", 0xde, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:26 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:26 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:26 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:26 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1061.704392] loop4: detected capacity change from 0 to 512 [ 1061.720015] EXT4-fs (loop4): invalid first ino: 0 [ 1061.778921] loop6: detected capacity change from 0 to 512 [ 1061.802010] EXT4-fs (loop6): invalid first ino: 0 19:40:35 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:35 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1071.384132] loop4: detected capacity change from 0 to 512 19:40:35 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1071.404388] loop6: detected capacity change from 0 to 512 [ 1071.404936] EXT4-fs (loop4): invalid first ino: 0 [ 1071.428604] EXT4-fs (loop6): failed to parse options in superblock: [ 1071.440872] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1071.448646] EXT4-fs (loop6): get root inode failed [ 1071.449067] EXT4-fs (loop6): mount failed 19:40:35 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:35 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:35 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1071.638084] loop4: detected capacity change from 0 to 512 19:40:36 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 1071.679099] EXT4-fs (loop4): invalid first ino: 0 [ 1071.761349] loop6: detected capacity change from 0 to 512 [ 1071.778164] EXT4-fs (loop6): failed to parse options in superblock: [ 1071.786872] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1071.800043] EXT4-fs (loop6): get root inode failed [ 1071.801207] EXT4-fs (loop6): mount failed 19:40:48 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:48 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:40:48 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:48 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1083.815207] loop6: detected capacity change from 0 to 512 [ 1083.816863] loop2: detected capacity change from 0 to 512 [ 1083.832230] EXT4-fs (loop6): failed to parse options in superblock: [ 1083.833348] EXT4-fs (loop2): invalid first ino: 0 [ 1083.845207] loop4: detected capacity change from 0 to 512 [ 1083.868768] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated 19:40:48 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1083.897477] EXT4-fs (loop6): get root inode failed [ 1083.898503] EXT4-fs (loop6): mount failed [ 1083.908727] EXT4-fs (loop4): failed to parse options in superblock: 19:40:48 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1083.958937] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated 19:40:48 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1083.977797] EXT4-fs (loop4): get root inode failed [ 1083.978603] EXT4-fs (loop4): mount failed 19:40:48 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:48 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:48 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:48 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d65", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1084.227302] loop4: detected capacity change from 0 to 512 [ 1084.227422] loop6: detected capacity change from 0 to 512 [ 1084.237342] EXT4-fs (loop6): failed to parse options in superblock: [ 1084.245689] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated 19:40:48 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1084.252392] EXT4-fs (loop6): get root inode failed [ 1084.253150] EXT4-fs (loop6): mount failed [ 1084.267848] EXT4-fs (loop4): failed to parse options in superblock: [ 1084.301650] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1084.317910] EXT4-fs (loop4): get root inode failed [ 1084.318349] EXT4-fs (loop4): mount failed 19:40:48 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:58 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:58 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:58 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x1f, 0xa0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc048, 0x0, 0x0, 0x5, 0x4, 0x106, 0xfffc, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0x80000e, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:40:58 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:58 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d65", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1093.863869] loop6: detected capacity change from 0 to 512 [ 1093.867194] EXT4-fs (loop6): failed to parse options in superblock: [ 1093.873965] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1093.875239] EXT4-fs (loop6): get root inode failed [ 1093.875681] EXT4-fs (loop6): mount failed 19:40:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1093.932736] loop4: detected capacity change from 0 to 512 [ 1093.938833] EXT4-fs (loop4): failed to parse options in superblock: [ 1093.944260] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1093.950484] EXT4-fs (loop4): get root inode failed [ 1093.950924] EXT4-fs (loop4): mount failed [ 1093.969352] loop2: detected capacity change from 0 to 512 [ 1093.980297] EXT4-fs (loop2): failed to parse options in superblock: [ 1093.997661] EXT4-fs error (device loop2): __ext4_fill_super:5512: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1094.002351] EXT4-fs (loop2): get root inode failed [ 1094.003583] EXT4-fs (loop2): mount failed 19:40:58 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:40:58 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1094.109322] loop6: detected capacity change from 0 to 512 [ 1094.123326] EXT4-fs (loop6): failed to parse options in superblock: [ 1094.130188] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1094.131356] EXT4-fs (loop6): get root inode failed [ 1094.131915] EXT4-fs (loop6): mount failed 19:41:08 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:08 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:08 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 1) 19:41:08 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d65", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:08 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1103.903845] loop4: detected capacity change from 0 to 512 [ 1103.906252] loop2: detected capacity change from 0 to 512 [ 1103.918295] EXT4-fs (loop2): failed to parse options in superblock: [ 1103.923074] EXT4-fs (loop4): failed to parse options in superblock: [ 1103.934263] loop6: detected capacity change from 0 to 512 [ 1103.936579] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1103.940352] EXT4-fs (loop6): failed to parse options in superblock: [ 1103.942438] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 1103.944475] EXT4-fs (loop4): get root inode failed [ 1103.945213] EXT4-fs (loop4): mount failed [ 1103.946792] EXT4-fs error (device loop2): __ext4_fill_super:5512: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1103.949885] FAULT_INJECTION: forcing a failure. [ 1103.949885] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.950811] CPU: 1 UID: 0 PID: 8870 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1103.950828] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1103.950835] Call Trace: [ 1103.950840] [ 1103.950845] dump_stack_lvl+0xfa/0x120 [ 1103.950867] should_fail_ex+0x4d7/0x5e0 [ 1103.950885] should_failslab+0xc2/0x120 [ 1103.950904] __kmalloc_cache_noprof+0x81/0x6b0 [ 1103.950926] ? task_active_pid_ns+0xa9/0xd0 [ 1103.950940] ? alloc_name+0x41/0x110 [ 1103.950957] ? alloc_name+0x41/0x110 [ 1103.950969] alloc_name+0x41/0x110 [ 1103.950981] __x64_sys_memfd_create+0x130/0x280 [ 1103.950996] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1103.951016] do_syscall_64+0xbf/0x390 [ 1103.951033] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1103.951047] RIP: 0033:0x7f9df200db19 [ 1103.951057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.951068] RSP: 002b:00007f9def582f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1103.951080] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9df200db19 [ 1103.951089] RDX: 0000000000000ac0 RSI: 0000000000000000 RDI: 00007f9df20670fb [ 1103.951097] RBP: 0000000000000002 R08: 0000000000000560 R09: ffffffffffffffff [ 1103.951104] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1103.951111] R13: 0000000020000100 R14: 0000000000000ac0 R15: 0000000020013c00 [ 1103.951131] [ 1103.963129] EXT4-fs (loop2): get root inode failed [ 1103.963591] EXT4-fs (loop2): mount failed 19:41:08 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9", 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1104.029241] loop2: detected capacity change from 0 to 512 [ 1104.031827] EXT4-fs (loop2): failed to parse options in superblock: 19:41:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1104.036455] EXT4-fs error (device loop2): __ext4_fill_super:5512: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1104.037778] EXT4-fs (loop2): get root inode failed [ 1104.038300] EXT4-fs (loop2): mount failed 19:41:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1104.134836] loop4: detected capacity change from 0 to 512 [ 1104.137922] loop6: detected capacity change from 0 to 512 [ 1104.143305] EXT4-fs (loop6): failed to parse options in superblock: [ 1104.146754] EXT4-fs (loop4): failed to parse options in superblock: [ 1104.148347] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1104.152219] EXT4-fs (loop6): get root inode failed [ 1104.152760] EXT4-fs (loop6): mount failed [ 1104.153968] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1104.159920] EXT4-fs (loop4): get root inode failed [ 1104.160365] EXT4-fs (loop4): mount failed 19:41:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:19 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 1) 19:41:19 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 2) 19:41:19 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:19 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9", 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1115.213930] loop2: detected capacity change from 0 to 512 19:41:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1115.287316] loop4: detected capacity change from 0 to 512 [ 1115.297722] loop6: detected capacity change from 0 to 512 [ 1115.303979] FAULT_INJECTION: forcing a failure. [ 1115.303979] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.305982] CPU: 1 UID: 0 PID: 8905 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1115.306014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1115.306026] Call Trace: [ 1115.306034] [ 1115.306043] dump_stack_lvl+0xfa/0x120 [ 1115.306074] should_fail_ex+0x4d7/0x5e0 [ 1115.306104] ? getname_flags.part.0+0x48/0x540 [ 1115.306139] should_failslab+0xc2/0x120 [ 1115.306171] kmem_cache_alloc_noprof+0x80/0x690 [ 1115.306208] ? lock_is_held_type+0x9e/0x120 [ 1115.306241] ? getname_flags.part.0+0x48/0x540 [ 1115.306276] getname_flags.part.0+0x48/0x540 [ 1115.306316] getname_flags+0x95/0xe0 [ 1115.306345] do_sys_openat2+0x9f/0x1b0 [ 1115.306381] ? __pfx_do_sys_openat2+0x10/0x10 [ 1115.306421] ? __fget_files+0x20d/0x3b0 [ 1115.306459] __x64_sys_openat+0x142/0x200 [ 1115.306481] ? __pfx___x64_sys_openat+0x10/0x10 [ 1115.306501] ? ksys_write+0x1a3/0x240 [ 1115.306554] do_syscall_64+0xbf/0x390 [ 1115.306584] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1115.306607] RIP: 0033:0x7fc66387fa04 [ 1115.306625] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1115.306646] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1115.306668] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1115.306684] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1115.306698] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1115.306711] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1115.306725] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1115.306763] [ 1115.350992] EXT4-fs (loop6): failed to parse options in superblock: [ 1115.366691] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1115.373278] EXT4-fs (loop6): get root inode failed [ 1115.374471] EXT4-fs (loop6): mount failed [ 1115.379235] EXT4-fs (loop4): failed to parse options in superblock: 19:41:19 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:19 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1115.406317] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1115.417147] EXT4-fs (loop4): get root inode failed [ 1115.418037] EXT4-fs (loop4): mount failed 19:41:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 3) 19:41:19 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9", 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1115.482452] loop2: detected capacity change from 0 to 512 19:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:19 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 2) [ 1115.578688] FAULT_INJECTION: forcing a failure. [ 1115.578688] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1115.580417] CPU: 0 UID: 0 PID: 8920 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1115.580446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1115.580459] Call Trace: [ 1115.580466] [ 1115.580475] dump_stack_lvl+0xfa/0x120 [ 1115.580505] should_fail_ex+0x4d7/0x5e0 [ 1115.580541] strncpy_from_user+0x3b/0x2f0 [ 1115.580578] alloc_name+0x78/0x110 [ 1115.580603] __x64_sys_memfd_create+0x130/0x280 [ 1115.580629] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1115.580666] do_syscall_64+0xbf/0x390 [ 1115.580695] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1115.580718] RIP: 0033:0x7f9df200db19 [ 1115.580734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1115.580755] RSP: 002b:00007f9def582f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1115.580775] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9df200db19 [ 1115.580790] RDX: 0000000000000ac0 RSI: 0000000000000000 RDI: 00007f9df20670fb [ 1115.580803] RBP: 0000000000000002 R08: 0000000000000560 R09: ffffffffffffffff [ 1115.580816] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1115.580828] R13: 0000000020000100 R14: 0000000000000ac0 R15: 0000000020013c00 [ 1115.580864] 19:41:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:20 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1115.675192] loop6: detected capacity change from 0 to 512 [ 1115.676375] loop4: detected capacity change from 0 to 512 19:41:20 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c575", 0x6f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1115.706872] EXT4-fs (loop4): failed to parse options in superblock: [ 1115.709868] EXT4-fs (loop6): failed to parse options in superblock: [ 1115.719287] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:41:20 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1115.732633] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1115.743138] EXT4-fs (loop6): get root inode failed [ 1115.744133] EXT4-fs (loop6): mount failed 19:41:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 4) 19:41:20 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 3) [ 1115.862007] loop2: detected capacity change from 0 to 512 [ 1115.863714] FAULT_INJECTION: forcing a failure. [ 1115.863714] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.865666] CPU: 1 UID: 0 PID: 8937 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1115.865696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1115.865709] Call Trace: [ 1115.865716] [ 1115.865725] dump_stack_lvl+0xfa/0x120 [ 1115.865755] should_fail_ex+0x4d7/0x5e0 [ 1115.865783] ? shmem_alloc_inode+0x27/0x50 [ 1115.865822] should_failslab+0xc2/0x120 [ 1115.865856] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1115.865894] ? perf_trace_lock+0xb5/0x5d0 [ 1115.865935] ? shmem_alloc_inode+0x27/0x50 [ 1115.865954] shmem_alloc_inode+0x27/0x50 [ 1115.865973] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1115.865993] alloc_inode+0x67/0x250 [ 1115.866037] new_inode+0x1e/0x160 [ 1115.866078] __shmem_get_inode+0x17c/0xe80 [ 1115.866112] __shmem_file_setup+0x107/0x370 [ 1115.866135] ? alloc_fd+0x2c1/0x560 [ 1115.866163] alloc_file+0x2ae/0x590 [ 1115.866192] __x64_sys_memfd_create+0x193/0x280 [ 1115.866217] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1115.866254] do_syscall_64+0xbf/0x390 [ 1115.866282] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1115.866304] RIP: 0033:0x7f9df200db19 [ 1115.866321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1115.866341] RSP: 002b:00007f9def582f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1115.866361] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9df200db19 [ 1115.866376] RDX: 0000000000000ac0 RSI: 0000000000000000 RDI: 00007f9df20670fb [ 1115.866389] RBP: 0000000000000002 R08: 0000000000000560 R09: ffffffffffffffff [ 1115.866401] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1115.866414] R13: 0000000020000100 R14: 0000000000000ac0 R15: 0000000020013c00 [ 1115.866449] 19:41:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1116.026519] FAULT_INJECTION: forcing a failure. [ 1116.026519] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1116.028542] CPU: 1 UID: 0 PID: 8943 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1116.028572] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1116.028584] Call Trace: [ 1116.028592] [ 1116.028600] dump_stack_lvl+0xfa/0x120 [ 1116.028630] should_fail_ex+0x4d7/0x5e0 [ 1116.028661] strncpy_from_user+0x3b/0x2f0 [ 1116.028698] getname_flags.part.0+0x8d/0x540 [ 1116.028737] getname_flags+0x95/0xe0 [ 1116.028764] do_sys_openat2+0x9f/0x1b0 [ 1116.028799] ? __pfx_do_sys_openat2+0x10/0x10 [ 1116.028837] ? __fget_files+0x20d/0x3b0 [ 1116.028873] __x64_sys_openat+0x142/0x200 [ 1116.028894] ? __pfx___x64_sys_openat+0x10/0x10 [ 1116.028913] ? ksys_write+0x1a3/0x240 [ 1116.028956] do_syscall_64+0xbf/0x390 [ 1116.028984] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1116.029007] RIP: 0033:0x7fc66387fa04 [ 1116.029024] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1116.029044] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1116.029065] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1116.029079] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1116.029093] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1116.029106] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1116.029118] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1116.029154] [ 1116.035333] loop4: detected capacity change from 0 to 512 [ 1116.086957] EXT4-fs (loop4): failed to parse options in superblock: [ 1116.105265] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1116.107361] EXT4-fs (loop4): get root inode failed [ 1116.108109] EXT4-fs (loop4): mount failed 19:41:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:30 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 4) [ 1126.170505] loop4: detected capacity change from 0 to 512 [ 1126.177043] FAULT_INJECTION: forcing a failure. [ 1126.177043] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.179221] CPU: 0 UID: 0 PID: 8955 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1126.179257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1126.179271] Call Trace: [ 1126.179281] [ 1126.179291] dump_stack_lvl+0xfa/0x120 [ 1126.179326] should_fail_ex+0x4d7/0x5e0 [ 1126.179360] ? alloc_empty_file+0x58/0x1e0 [ 1126.179398] should_failslab+0xc2/0x120 [ 1126.179434] kmem_cache_alloc_noprof+0x80/0x690 [ 1126.179475] ? __is_insn_slot_addr+0x140/0x290 [ 1126.179527] ? alloc_empty_file+0x58/0x1e0 [ 1126.179564] alloc_empty_file+0x58/0x1e0 [ 1126.179606] path_openat+0xe0/0x2880 [ 1126.179638] ? perf_trace_lock_acquire+0xc9/0x700 [ 1126.179677] ? perf_trace_lock_acquire+0xc9/0x700 [ 1126.179727] ? __pfx_path_openat+0x10/0x10 [ 1126.179758] ? perf_trace_lock_acquire+0xc9/0x700 [ 1126.179808] do_filp_open+0x1e8/0x450 [ 1126.179839] ? __pfx_do_filp_open+0x10/0x10 [ 1126.179889] ? find_held_lock+0x2b/0x80 [ 1126.179916] ? alloc_fd+0x2c1/0x560 [ 1126.179943] ? lock_release+0xc8/0x290 [ 1126.179985] ? _raw_spin_unlock+0x1e/0x40 [ 1126.180023] ? alloc_fd+0x2c1/0x560 [ 1126.180067] do_sys_openat2+0x104/0x1b0 [ 1126.180108] ? __pfx_do_sys_openat2+0x10/0x10 [ 1126.180146] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1126.180185] ? perf_trace_preemptirq_template+0x259/0x430 [ 1126.180228] __x64_sys_openat+0x142/0x200 [ 1126.180253] ? __pfx___x64_sys_openat+0x10/0x10 [ 1126.180302] do_syscall_64+0xbf/0x390 [ 1126.180335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1126.180361] RIP: 0033:0x7fc66387fa04 [ 1126.180381] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1126.180405] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1126.180430] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1126.180448] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1126.180463] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1126.180479] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1126.180493] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1126.180536] 19:41:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 5) 19:41:30 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:30 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c575", 0x6f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:30 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1126.273403] loop2: detected capacity change from 0 to 512 [ 1126.283441] EXT4-fs (loop4): failed to parse options in superblock: [ 1126.287683] loop6: detected capacity change from 0 to 512 19:41:30 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1126.306793] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1126.314052] EXT4-fs (loop4): get root inode failed [ 1126.315060] EXT4-fs (loop4): mount failed [ 1126.323015] EXT4-fs (loop6): failed to parse options in superblock: [ 1126.328931] EXT4-fs warning (device loop6): ext4_multi_mount_protect:292: Invalid MMP block in superblock 19:41:30 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c575", 0x6f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:41 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1136.907206] loop4: detected capacity change from 0 to 512 19:41:41 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:41 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 5) 19:41:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 6) 19:41:41 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052", 0x61, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1136.930952] EXT4-fs (loop4): failed to parse options in superblock: [ 1136.943640] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1136.946147] loop2: detected capacity change from 0 to 512 [ 1136.951242] EXT4-fs (loop4): get root inode failed [ 1136.951724] EXT4-fs (loop4): mount failed [ 1136.957197] loop6: detected capacity change from 0 to 512 [ 1136.964298] FAULT_INJECTION: forcing a failure. [ 1136.964298] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.965446] CPU: 1 UID: 0 PID: 8996 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1136.965465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1136.965473] Call Trace: [ 1136.965478] [ 1136.965483] dump_stack_lvl+0xfa/0x120 [ 1136.965505] should_fail_ex+0x4d7/0x5e0 [ 1136.965528] ? security_inode_alloc+0x3e/0x130 [ 1136.965544] should_failslab+0xc2/0x120 [ 1136.965564] kmem_cache_alloc_noprof+0x80/0x690 [ 1136.965587] ? __pfx_map_id_range_down+0x10/0x10 [ 1136.965615] ? security_inode_alloc+0x3e/0x130 [ 1136.965629] security_inode_alloc+0x3e/0x130 [ 1136.965646] inode_init_always_gfp+0xc94/0xff0 [ 1136.965668] alloc_inode+0x8d/0x250 [ 1136.965689] new_inode+0x1e/0x160 [ 1136.965711] __shmem_get_inode+0x17c/0xe80 [ 1136.965733] __shmem_file_setup+0x107/0x370 [ 1136.965749] ? alloc_fd+0x2c1/0x560 [ 1136.965766] alloc_file+0x2ae/0x590 [ 1136.965784] __x64_sys_memfd_create+0x193/0x280 [ 1136.965801] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1136.965824] do_syscall_64+0xbf/0x390 [ 1136.965843] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1136.965857] RIP: 0033:0x7f9df200db19 [ 1136.965868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1136.965881] RSP: 002b:00007f9def582f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1136.965894] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9df200db19 [ 1136.965904] RDX: 0000000000000ac0 RSI: 0000000000000000 RDI: 00007f9df20670fb [ 1136.965912] RBP: 0000000000000002 R08: 0000000000000560 R09: ffffffffffffffff [ 1136.965920] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1136.965928] R13: 0000000020000100 R14: 0000000000000ac0 R15: 0000000020013c00 [ 1136.965949] [ 1136.982738] EXT4-fs (loop6): failed to parse options in superblock: 19:41:41 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 6) [ 1137.004108] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated 19:41:41 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1137.009460] EXT4-fs (loop6): get root inode failed [ 1137.010285] EXT4-fs (loop6): mount failed 19:41:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:41 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d65", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1137.085834] FAULT_INJECTION: forcing a failure. [ 1137.085834] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.087004] CPU: 1 UID: 0 PID: 9003 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1137.087022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1137.087030] Call Trace: [ 1137.087034] [ 1137.087039] dump_stack_lvl+0xfa/0x120 [ 1137.087059] should_fail_ex+0x4d7/0x5e0 [ 1137.087077] ? security_file_alloc+0x35/0x130 [ 1137.087094] should_failslab+0xc2/0x120 [ 1137.087113] kmem_cache_alloc_noprof+0x80/0x690 [ 1137.087134] ? __create_object+0x59/0x80 [ 1137.087159] ? security_file_alloc+0x35/0x130 [ 1137.087175] security_file_alloc+0x35/0x130 [ 1137.087192] init_file+0x95/0x4c0 [ 1137.087214] alloc_empty_file+0x76/0x1e0 [ 1137.087234] path_openat+0xe0/0x2880 [ 1137.087250] ? perf_trace_lock_acquire+0xc9/0x700 [ 1137.087270] ? perf_trace_lock_acquire+0xc9/0x700 [ 1137.087297] ? __pfx_path_openat+0x10/0x10 [ 1137.087312] ? perf_trace_lock_acquire+0xc9/0x700 [ 1137.087336] do_filp_open+0x1e8/0x450 [ 1137.087351] ? __pfx_do_filp_open+0x10/0x10 [ 1137.087375] ? find_held_lock+0x2b/0x80 [ 1137.087388] ? alloc_fd+0x2c1/0x560 [ 1137.087402] ? lock_release+0xc8/0x290 [ 1137.087422] ? _raw_spin_unlock+0x1e/0x40 [ 1137.087442] ? alloc_fd+0x2c1/0x560 [ 1137.087462] do_sys_openat2+0x104/0x1b0 [ 1137.087482] ? __pfx_do_sys_openat2+0x10/0x10 [ 1137.087504] ? __fget_files+0x20d/0x3b0 [ 1137.087529] __x64_sys_openat+0x142/0x200 [ 1137.087541] ? __pfx___x64_sys_openat+0x10/0x10 [ 1137.087552] ? ksys_write+0x1a3/0x240 [ 1137.087577] do_syscall_64+0xbf/0x390 [ 1137.087593] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1137.087607] RIP: 0033:0x7fc66387fa04 [ 1137.087617] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1137.087629] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1137.087641] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1137.087649] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1137.087657] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1137.087664] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1137.087672] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1137.087693] 19:41:41 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052", 0x61, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 7) [ 1137.151400] loop4: detected capacity change from 0 to 512 [ 1137.156874] loop6: detected capacity change from 0 to 512 [ 1137.160176] EXT4-fs (loop6): failed to parse options in superblock: 19:41:41 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 1137.168854] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1137.173983] EXT4-fs (loop6): get root inode failed [ 1137.174428] EXT4-fs (loop6): mount failed [ 1137.219655] EXT4-fs (loop4): failed to parse options in superblock: [ 1137.222182] EXT4-fs warning (device loop4): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 1137.224029] loop2: detected capacity change from 0 to 512 19:41:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052", 0x61, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1137.264378] loop6: detected capacity change from 0 to 512 19:41:41 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 7) 19:41:41 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) [ 1137.277966] EXT4-fs (loop6): failed to parse options in superblock: [ 1137.293230] EXT4-fs error (device loop6): __ext4_fill_super:5512: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1137.317077] EXT4-fs (loop6): get root inode failed [ 1137.317895] EXT4-fs (loop6): mount failed 19:41:53 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 8) 19:41:53 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 8) 19:41:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:53 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d65", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052", 0x61, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:53 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) shutdown(r0, 0x1) 19:41:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1148.834327] loop6: detected capacity change from 0 to 512 [ 1148.846644] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1148.900910] loop4: detected capacity change from 0 to 512 [ 1148.902003] loop2: detected capacity change from 0 to 8 [ 1148.909287] FAULT_INJECTION: forcing a failure. [ 1148.909287] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.910956] FAULT_INJECTION: forcing a failure. [ 1148.910956] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.911243] CPU: 0 UID: 0 PID: 9045 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1148.911274] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.911287] Call Trace: [ 1148.911294] [ 1148.911302] dump_stack_lvl+0xfa/0x120 [ 1148.911332] should_fail_ex+0x4d7/0x5e0 [ 1148.911363] should_failslab+0xc2/0x120 [ 1148.911394] __kmalloc_cache_noprof+0x81/0x6b0 [ 1148.911432] ? mon_bin_open+0xe8/0x4a0 [ 1148.911465] ? find_held_lock+0x2b/0x80 [ 1148.911491] ? __pfx_mon_bin_open+0x10/0x10 [ 1148.911531] ? mon_bin_open+0xe8/0x4a0 [ 1148.911562] mon_bin_open+0xe8/0x4a0 [ 1148.911596] ? __pfx_mon_bin_open+0x10/0x10 [ 1148.911628] chrdev_open+0x234/0x690 [ 1148.911658] ? __pfx_chrdev_open+0x10/0x10 [ 1148.911686] ? lock_release+0xc8/0x290 [ 1148.911726] do_dentry_open+0x71c/0x1420 [ 1148.911756] ? __pfx_chrdev_open+0x10/0x10 [ 1148.911786] ? inode_permission+0x134/0x610 [ 1148.911822] vfs_open+0x82/0x3f0 [ 1148.911853] ? may_open+0x1f3/0x420 [ 1148.911877] path_openat+0x1c3f/0x2880 [ 1148.911921] ? __pfx_path_openat+0x10/0x10 [ 1148.911947] ? perf_trace_lock_acquire+0xc9/0x700 [ 1148.911990] do_filp_open+0x1e8/0x450 [ 1148.912016] ? __pfx_do_filp_open+0x10/0x10 [ 1148.912058] ? find_held_lock+0x2b/0x80 [ 1148.912080] ? alloc_fd+0x2c1/0x560 [ 1148.912104] ? lock_release+0xc8/0x290 [ 1148.912141] ? alloc_fd+0x2c1/0x560 [ 1148.912178] do_sys_openat2+0x104/0x1b0 [ 1148.912211] ? __pfx_do_sys_openat2+0x10/0x10 [ 1148.912243] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1148.912277] ? perf_trace_preemptirq_template+0x259/0x430 [ 1148.912313] __x64_sys_openat+0x142/0x200 [ 1148.912334] ? __pfx___x64_sys_openat+0x10/0x10 [ 1148.912373] do_syscall_64+0xbf/0x390 [ 1148.912402] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1148.912424] RIP: 0033:0x7fc66387fa04 [ 1148.912441] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1148.912461] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1148.912482] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1148.912496] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1148.912510] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1148.912522] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1148.912535] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1148.912572] [ 1148.945684] CPU: 1 UID: 0 PID: 9048 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1148.945714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.945726] Call Trace: [ 1148.945734] [ 1148.945743] dump_stack_lvl+0xfa/0x120 [ 1148.945773] should_fail_ex+0x4d7/0x5e0 [ 1148.945802] ? __d_alloc+0x31/0xa10 [ 1148.945829] should_failslab+0xc2/0x120 [ 1148.945859] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1148.945896] ? find_held_lock+0x2b/0x80 [ 1148.945930] ? __d_alloc+0x31/0xa10 [ 1148.945956] __d_alloc+0x31/0xa10 [ 1148.945983] ? mpol_shared_policy_init+0x24f/0x390 [ 1148.946014] d_alloc_pseudo+0x1d/0xc0 [ 1148.946034] alloc_file_pseudo+0xbe/0x220 [ 1148.946071] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1148.946105] ? __shmem_get_inode+0x682/0xe80 [ 1148.946139] __shmem_file_setup+0x1a7/0x370 [ 1148.946163] ? alloc_fd+0x2c1/0x560 [ 1148.946191] alloc_file+0x2ae/0x590 [ 1148.946220] __x64_sys_memfd_create+0x193/0x280 19:41:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1148.946262] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1148.946299] do_syscall_64+0xbf/0x390 [ 1148.946328] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1148.946350] RIP: 0033:0x7f9df200db19 [ 1148.946366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1148.946386] RSP: 002b:00007f9def582f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1148.946407] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9df200db19 [ 1148.946421] RDX: 0000000000000ac0 RSI: 0000000000000000 RDI: 00007f9df20670fb [ 1148.946434] RBP: 0000000000000002 R08: 0000000000000560 R09: ffffffffffffffff [ 1148.946446] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1148.946459] R13: 0000000020000100 R14: 0000000000000ac0 R15: 0000000020013c00 [ 1148.946494] [ 1148.991713] EXT4-fs (loop4): failed to parse options in superblock: [ 1148.993687] EXT4-fs (loop2): failed to parse options in superblock: [ 1148.994734] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (2 blocks) [ 1149.009228] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1149.019759] EXT4-fs (loop4): get root inode failed [ 1149.020506] EXT4-fs (loop4): mount failed 19:41:53 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:53 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d65", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:41:53 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 9) 19:41:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:41:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 9) 19:41:53 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1149.151982] loop6: detected capacity change from 0 to 512 19:41:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052", 0x61, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1149.195933] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:41:53 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1149.229290] loop2: detected capacity change from 0 to 8 [ 1149.248249] EXT4-fs (loop2): failed to parse options in superblock: [ 1149.249626] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (2 blocks) 19:41:53 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 10) 19:41:53 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9", 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1149.401126] loop4: detected capacity change from 0 to 512 [ 1149.430078] FAULT_INJECTION: forcing a failure. [ 1149.430078] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.431807] CPU: 0 UID: 0 PID: 9071 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1149.431837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1149.431849] Call Trace: [ 1149.431857] [ 1149.431866] dump_stack_lvl+0xfa/0x120 [ 1149.431896] should_fail_ex+0x4d7/0x5e0 [ 1149.431927] should_failslab+0xc2/0x120 [ 1149.431958] __kmalloc_cache_noprof+0x81/0x6b0 [ 1149.431994] ? lockdep_init_map_type+0x4b/0x240 [ 1149.432026] ? mon_bin_open+0x1aa/0x4a0 [ 1149.432067] ? mon_bin_open+0x1aa/0x4a0 [ 1149.432099] mon_bin_open+0x1aa/0x4a0 [ 1149.432133] ? __pfx_mon_bin_open+0x10/0x10 [ 1149.432165] chrdev_open+0x234/0x690 [ 1149.432195] ? __pfx_chrdev_open+0x10/0x10 [ 1149.432224] ? lock_release+0xc8/0x290 [ 1149.432263] do_dentry_open+0x71c/0x1420 [ 1149.432294] ? __pfx_chrdev_open+0x10/0x10 [ 1149.432323] ? inode_permission+0x134/0x610 [ 1149.432359] vfs_open+0x82/0x3f0 [ 1149.432390] ? may_open+0x1f3/0x420 [ 1149.432415] path_openat+0x1c3f/0x2880 [ 1149.432454] EXT4-fs (loop4): failed to parse options in superblock: [ 1149.432459] ? __pfx_path_openat+0x10/0x10 [ 1149.432486] ? perf_trace_lock_acquire+0xc9/0x700 [ 1149.432536] do_filp_open+0x1e8/0x450 [ 1149.432562] ? __pfx_do_filp_open+0x10/0x10 [ 1149.432609] ? find_held_lock+0x2b/0x80 [ 1149.432632] ? alloc_fd+0x2c1/0x560 [ 1149.432655] ? lock_release+0xc8/0x290 [ 1149.432692] ? alloc_fd+0x2c1/0x560 [ 1149.432729] do_sys_openat2+0x104/0x1b0 [ 1149.432763] ? __pfx_do_sys_openat2+0x10/0x10 [ 1149.432794] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1149.432828] ? perf_trace_preemptirq_template+0x259/0x430 [ 1149.432865] __x64_sys_openat+0x142/0x200 [ 1149.432886] ? __pfx___x64_sys_openat+0x10/0x10 [ 1149.432925] do_syscall_64+0xbf/0x390 [ 1149.432954] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1149.432977] RIP: 0033:0x7fc66387fa04 [ 1149.432994] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1149.433014] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1149.433035] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1149.433050] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1149.433063] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1149.433077] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1149.433089] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1149.433126] [ 1149.516845] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1149.519275] EXT4-fs (loop4): get root inode failed [ 1149.520383] EXT4-fs (loop4): mount failed 19:42:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 10) 19:42:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052", 0x61, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:05 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 11) 19:42:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:05 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9", 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:05 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:05 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1161.393808] loop4: detected capacity change from 0 to 512 [ 1161.407845] loop6: detected capacity change from 0 to 512 [ 1161.418668] FAULT_INJECTION: forcing a failure. [ 1161.418668] name failslab, interval 1, probability 0, space 0, times 0 [ 1161.419820] EXT4-fs (loop4): failed to parse options in superblock: [ 1161.420369] CPU: 1 UID: 0 PID: 9092 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1161.420399] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1161.420411] Call Trace: [ 1161.420419] [ 1161.420428] dump_stack_lvl+0xfa/0x120 [ 1161.420457] should_fail_ex+0x4d7/0x5e0 [ 1161.420486] ? alloc_empty_file+0x58/0x1e0 [ 1161.420524] should_failslab+0xc2/0x120 [ 1161.420554] kmem_cache_alloc_noprof+0x80/0x690 [ 1161.420589] ? d_instantiate+0x79/0xa0 [ 1161.420626] ? alloc_empty_file+0x58/0x1e0 [ 1161.420656] alloc_empty_file+0x58/0x1e0 [ 1161.420691] alloc_file_pseudo+0x12b/0x220 [ 1161.420727] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1161.420773] __shmem_file_setup+0x1a7/0x370 [ 1161.420798] ? alloc_fd+0x2c1/0x560 [ 1161.420825] alloc_file+0x2ae/0x590 [ 1161.420854] __x64_sys_memfd_create+0x193/0x280 [ 1161.420879] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1161.420916] do_syscall_64+0xbf/0x390 [ 1161.420945] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1161.420967] RIP: 0033:0x7f9df200db19 [ 1161.420984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.421004] RSP: 002b:00007f9def582f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1161.421024] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9df200db19 [ 1161.421038] RDX: 0000000000000ac0 RSI: 0000000000000000 RDI: 00007f9df20670fb [ 1161.421051] RBP: 0000000000000002 R08: 0000000000000560 R09: ffffffffffffffff [ 1161.421064] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1161.421077] R13: 0000000020000100 R14: 0000000000000ac0 R15: 0000000020013c00 [ 1161.421112] [ 1161.423399] loop2: detected capacity change from 0 to 8 [ 1161.431835] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1161.475916] EXT4-fs (loop2): failed to parse options in superblock: [ 1161.477025] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (2 blocks) [ 1161.477365] EXT4-fs error (device loop4): __ext4_fill_super:5512: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1161.487378] EXT4-fs (loop4): get root inode failed [ 1161.488235] EXT4-fs (loop4): mount failed 19:42:05 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9", 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 11) 19:42:05 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:05 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 12) 19:42:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) [ 1161.683762] FAULT_INJECTION: forcing a failure. [ 1161.683762] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1161.685129] CPU: 0 UID: 0 PID: 9106 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1161.685152] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1161.685162] Call Trace: [ 1161.685169] [ 1161.685175] dump_stack_lvl+0xfa/0x120 [ 1161.685199] should_fail_ex+0x4d7/0x5e0 [ 1161.685223] should_fail_alloc_page+0xe0/0x110 [ 1161.685249] prepare_alloc_pages+0x1eb/0x550 [ 1161.685276] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1161.685306] ? stack_trace_save+0x8e/0xc0 [ 1161.685334] ? stack_depot_save_flags+0x2c/0xa20 [ 1161.685364] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1161.685392] ? kasan_save_stack+0x24/0x50 [ 1161.685413] ? kasan_save_track+0x14/0x30 [ 1161.685433] ? __kasan_kmalloc+0x7f/0x90 [ 1161.685457] ? do_filp_open+0x1e8/0x450 [ 1161.685476] ? do_sys_openat2+0x104/0x1b0 [ 1161.685501] ? __x64_sys_openat+0x142/0x200 [ 1161.685520] ? do_syscall_64+0xbf/0x390 [ 1161.685539] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1161.685558] ? __pfx_perf_trace_lock+0x10/0x10 [ 1161.685585] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1161.685607] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1161.685636] ? policy_nodemask+0xeb/0x4e0 [ 1161.685666] alloc_pages_mpol+0xed/0x340 [ 1161.685692] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1161.685720] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1161.685747] ? __create_object+0x59/0x80 [ 1161.685776] alloc_pages_noprof+0x9d/0x180 [ 1161.685805] get_zeroed_page_noprof+0x18/0xb0 [ 1161.685824] mon_alloc_buff+0xed/0x250 [ 1161.685856] mon_bin_open+0x209/0x4a0 [ 1161.685882] ? __pfx_mon_bin_open+0x10/0x10 [ 1161.685906] chrdev_open+0x234/0x690 [ 1161.685929] ? __pfx_chrdev_open+0x10/0x10 [ 1161.685950] ? lock_release+0xc8/0x290 [ 1161.685981] do_dentry_open+0x71c/0x1420 [ 1161.686004] ? __pfx_chrdev_open+0x10/0x10 [ 1161.686026] ? inode_permission+0x134/0x610 [ 1161.686054] vfs_open+0x82/0x3f0 [ 1161.686077] ? may_open+0x1f3/0x420 [ 1161.686096] path_openat+0x1c3f/0x2880 [ 1161.686129] ? __pfx_path_openat+0x10/0x10 [ 1161.686148] ? perf_trace_lock_acquire+0xc9/0x700 [ 1161.686180] do_filp_open+0x1e8/0x450 [ 1161.686200] ? __pfx_do_filp_open+0x10/0x10 [ 1161.686232] ? find_held_lock+0x2b/0x80 [ 1161.686249] ? alloc_fd+0x2c1/0x560 [ 1161.686267] ? lock_release+0xc8/0x290 [ 1161.686295] ? alloc_fd+0x2c1/0x560 [ 1161.686323] do_sys_openat2+0x104/0x1b0 [ 1161.686349] ? __pfx_do_sys_openat2+0x10/0x10 [ 1161.686373] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1161.686411] ? perf_trace_preemptirq_template+0x259/0x430 [ 1161.686438] __x64_sys_openat+0x142/0x200 [ 1161.686454] ? __pfx___x64_sys_openat+0x10/0x10 [ 1161.686483] do_syscall_64+0xbf/0x390 [ 1161.686504] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1161.686520] RIP: 0033:0x7fc66387fa04 [ 1161.686533] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1161.686548] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1161.686564] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1161.686575] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1161.686584] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1161.686594] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1161.686603] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1161.686630] [ 1161.712205] No source specified [ 1161.760346] loop4: detected capacity change from 0 to 512 [ 1161.779190] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:42:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 12) 19:42:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, 0x0) 19:42:16 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:16 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c575", 0x6f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:16 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 13) 19:42:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:16 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1171.971937] No source specified [ 1171.976062] FAULT_INJECTION: forcing a failure. [ 1171.976062] name failslab, interval 1, probability 0, space 0, times 0 [ 1171.978097] CPU: 0 UID: 0 PID: 9117 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1171.978132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1171.978146] Call Trace: [ 1171.978155] [ 1171.978165] dump_stack_lvl+0xfa/0x120 [ 1171.978199] should_fail_ex+0x4d7/0x5e0 [ 1171.978233] ? security_file_alloc+0x35/0x130 [ 1171.978266] should_failslab+0xc2/0x120 [ 1171.978302] kmem_cache_alloc_noprof+0x80/0x690 [ 1171.978344] ? __create_object+0x59/0x80 [ 1171.978393] ? security_file_alloc+0x35/0x130 [ 1171.978425] security_file_alloc+0x35/0x130 19:42:16 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1171.978460] init_file+0x95/0x4c0 [ 1171.978501] alloc_empty_file+0x76/0x1e0 [ 1171.978566] alloc_file_pseudo+0x12b/0x220 [ 1171.978609] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1171.978665] __shmem_file_setup+0x1a7/0x370 [ 1171.978694] ? alloc_fd+0x2c1/0x560 [ 1171.978728] alloc_file+0x2ae/0x590 [ 1171.978761] __x64_sys_memfd_create+0x193/0x280 [ 1171.978791] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1171.978836] do_syscall_64+0xbf/0x390 [ 1171.978870] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1171.978896] RIP: 0033:0x7f9df200db19 [ 1171.978916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1171.978940] RSP: 002b:00007f9def582f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1171.978964] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9df200db19 [ 1171.978982] RDX: 0000000000000ac0 RSI: 0000000000000000 RDI: 00007f9df20670fb [ 1171.978997] RBP: 0000000000000002 R08: 0000000000000560 R09: ffffffffffffffff [ 1171.979012] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1171.979027] R13: 0000000020000100 R14: 0000000000000ac0 R15: 0000000020013c00 [ 1171.979070] 19:42:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) [ 1172.048689] loop6: detected capacity change from 0 to 512 [ 1172.055030] loop4: detected capacity change from 0 to 512 [ 1172.068716] No source specified [ 1172.073149] FAULT_INJECTION: forcing a failure. [ 1172.073149] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1172.074934] CPU: 0 UID: 0 PID: 9133 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1172.074963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1172.074975] Call Trace: [ 1172.074983] [ 1172.074992] dump_stack_lvl+0xfa/0x120 [ 1172.075022] should_fail_ex+0x4d7/0x5e0 [ 1172.075052] should_fail_alloc_page+0xe0/0x110 [ 1172.075084] prepare_alloc_pages+0x1eb/0x550 [ 1172.075119] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1172.075160] ? stack_trace_save+0x8e/0xc0 [ 1172.075195] ? stack_depot_save_flags+0x2c/0xa20 [ 1172.075234] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1172.075270] ? kasan_save_stack+0x24/0x50 [ 1172.075297] ? kasan_save_track+0x14/0x30 [ 1172.075323] ? __kasan_kmalloc+0x7f/0x90 [ 1172.075354] ? do_filp_open+0x1e8/0x450 [ 1172.075379] ? do_sys_openat2+0x104/0x1b0 [ 1172.075410] ? __x64_sys_openat+0x142/0x200 [ 1172.075428] ? do_syscall_64+0xbf/0x390 [ 1172.075452] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1172.075476] ? __pfx_perf_trace_lock+0x10/0x10 [ 1172.075518] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1172.075547] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1172.075584] ? policy_nodemask+0xeb/0x4e0 [ 1172.075623] alloc_pages_mpol+0xed/0x340 [ 1172.075658] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1172.075694] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1172.075729] ? __create_object+0x59/0x80 [ 1172.075767] alloc_pages_noprof+0x9d/0x180 [ 1172.075805] get_zeroed_page_noprof+0x18/0xb0 [ 1172.075829] mon_alloc_buff+0xed/0x250 [ 1172.075870] mon_bin_open+0x209/0x4a0 [ 1172.075905] ? __pfx_mon_bin_open+0x10/0x10 [ 1172.075936] chrdev_open+0x234/0x690 [ 1172.075966] ? __pfx_chrdev_open+0x10/0x10 [ 1172.075994] ? lock_release+0xc8/0x290 [ 1172.076035] do_dentry_open+0x71c/0x1420 [ 1172.076065] ? __pfx_chrdev_open+0x10/0x10 [ 1172.076094] ? inode_permission+0x134/0x610 [ 1172.076130] vfs_open+0x82/0x3f0 [ 1172.076161] ? may_open+0x1f3/0x420 [ 1172.076185] path_openat+0x1c3f/0x2880 [ 1172.076228] ? __pfx_path_openat+0x10/0x10 [ 1172.076254] ? perf_trace_lock_acquire+0xc9/0x700 [ 1172.076296] do_filp_open+0x1e8/0x450 [ 1172.076322] ? __pfx_do_filp_open+0x10/0x10 [ 1172.076365] ? find_held_lock+0x2b/0x80 [ 1172.076388] ? alloc_fd+0x2c1/0x560 [ 1172.076411] ? lock_release+0xc8/0x290 [ 1172.076448] ? alloc_fd+0x2c1/0x560 [ 1172.076485] do_sys_openat2+0x104/0x1b0 [ 1172.076519] ? __pfx_do_sys_openat2+0x10/0x10 [ 1172.076550] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1172.076584] ? perf_trace_preemptirq_template+0x259/0x430 [ 1172.076618] __x64_sys_openat+0x142/0x200 [ 1172.076639] ? __pfx___x64_sys_openat+0x10/0x10 [ 1172.076679] do_syscall_64+0xbf/0x390 [ 1172.076706] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1172.076727] RIP: 0033:0x7fc66387fa04 [ 1172.076744] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1172.076763] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1172.076784] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1172.076799] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1172.076812] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1172.076824] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1172.076837] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1172.076873] [ 1172.094576] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:42:26 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:26 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c575", 0x6f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 13) 19:42:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, 0x0) 19:42:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:26 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 14) 19:42:26 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1182.499350] loop4: detected capacity change from 0 to 512 [ 1182.500867] FAULT_INJECTION: forcing a failure. [ 1182.500867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1182.501855] CPU: 1 UID: 0 PID: 9144 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1182.501871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1182.501878] Call Trace: [ 1182.501883] [ 1182.501887] dump_stack_lvl+0xfa/0x120 [ 1182.501908] should_fail_ex+0x4d7/0x5e0 [ 1182.501928] should_fail_alloc_page+0xe0/0x110 [ 1182.501948] prepare_alloc_pages+0x1eb/0x550 [ 1182.501967] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1182.501989] ? stack_trace_save+0x8e/0xc0 [ 1182.502010] ? stack_depot_save_flags+0x2c/0xa20 [ 1182.502031] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1182.502051] ? kasan_save_stack+0x24/0x50 [ 1182.502066] ? kasan_save_track+0x14/0x30 [ 1182.502081] ? __kasan_kmalloc+0x7f/0x90 [ 1182.502098] ? do_filp_open+0x1e8/0x450 [ 1182.502112] ? do_sys_openat2+0x104/0x1b0 [ 1182.502130] ? __x64_sys_openat+0x142/0x200 [ 1182.502140] ? do_syscall_64+0xbf/0x390 [ 1182.502154] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1182.502168] ? __pfx_perf_trace_lock+0x10/0x10 [ 1182.502188] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1182.502204] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1182.502224] ? policy_nodemask+0xeb/0x4e0 [ 1182.502246] alloc_pages_mpol+0xed/0x340 [ 1182.502265] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1182.502285] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1182.502304] ? __create_object+0x59/0x80 [ 1182.502325] alloc_pages_noprof+0x9d/0x180 [ 1182.502345] get_zeroed_page_noprof+0x18/0xb0 [ 1182.502358] mon_alloc_buff+0xed/0x250 [ 1182.502382] mon_bin_open+0x209/0x4a0 [ 1182.502401] ? __pfx_mon_bin_open+0x10/0x10 [ 1182.502418] chrdev_open+0x234/0x690 [ 1182.502435] ? __pfx_chrdev_open+0x10/0x10 [ 1182.502451] ? lock_release+0xc8/0x290 [ 1182.502473] do_dentry_open+0x71c/0x1420 [ 1182.502490] ? __pfx_chrdev_open+0x10/0x10 [ 1182.502506] ? inode_permission+0x134/0x610 [ 1182.502530] vfs_open+0x82/0x3f0 [ 1182.502547] ? may_open+0x1f3/0x420 [ 1182.502560] path_openat+0x1c3f/0x2880 [ 1182.502587] ? __pfx_path_openat+0x10/0x10 [ 1182.502601] ? perf_trace_lock_acquire+0xc9/0x700 [ 1182.502624] do_filp_open+0x1e8/0x450 [ 1182.502638] ? __pfx_do_filp_open+0x10/0x10 [ 1182.502660] ? find_held_lock+0x2b/0x80 [ 1182.502688] ? alloc_fd+0x2c1/0x560 [ 1182.502705] ? lock_release+0xc8/0x290 [ 1182.502732] ? alloc_fd+0x2c1/0x560 [ 1182.502761] do_sys_openat2+0x104/0x1b0 [ 1182.502785] ? __pfx_do_sys_openat2+0x10/0x10 [ 1182.502805] ? __fget_files+0x20d/0x3b0 [ 1182.502825] __x64_sys_openat+0x142/0x200 [ 1182.502836] ? __pfx___x64_sys_openat+0x10/0x10 [ 1182.502846] ? ksys_write+0x1a3/0x240 [ 1182.502869] do_syscall_64+0xbf/0x390 [ 1182.502884] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1182.502896] RIP: 0033:0x7fc66387fa04 [ 1182.502907] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1182.502919] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1182.502933] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1182.502941] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1182.502948] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1182.502956] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1182.502962] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1182.502982] [ 1182.534571] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1182.595983] loop6: detected capacity change from 0 to 512 19:42:26 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, 0x0) 19:42:26 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac", 0x8}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:26 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 15) [ 1182.658485] loop2: detected capacity change from 0 to 512 19:42:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 14) [ 1182.685913] EXT4-fs (loop2): failed to parse options in superblock: [ 1182.691302] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1182.692096] EXT4-fs (loop2): group descriptors corrupted! [ 1182.708376] FAULT_INJECTION: forcing a failure. [ 1182.708376] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:42:27 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c575", 0x6f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1182.709576] CPU: 1 UID: 0 PID: 9159 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1182.709592] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1182.709599] Call Trace: [ 1182.709603] [ 1182.709608] dump_stack_lvl+0xfa/0x120 [ 1182.709627] should_fail_ex+0x4d7/0x5e0 [ 1182.709644] should_fail_alloc_page+0xe0/0x110 [ 1182.709662] prepare_alloc_pages+0x1eb/0x550 [ 1182.709682] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1182.709704] ? stack_trace_save+0x8e/0xc0 [ 1182.709724] ? stack_depot_save_flags+0x2c/0xa20 [ 1182.709745] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1182.709765] ? kasan_save_stack+0x24/0x50 [ 1182.709780] ? kasan_save_track+0x14/0x30 [ 1182.709795] ? __kasan_kmalloc+0x7f/0x90 [ 1182.709812] ? do_filp_open+0x1e8/0x450 [ 1182.709826] ? do_sys_openat2+0x104/0x1b0 [ 1182.709844] ? __x64_sys_openat+0x142/0x200 [ 1182.709854] ? do_syscall_64+0xbf/0x390 [ 1182.709868] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1182.709881] ? __pfx_perf_trace_lock+0x10/0x10 [ 1182.709901] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1182.709917] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1182.709938] ? policy_nodemask+0xeb/0x4e0 [ 1182.709960] alloc_pages_mpol+0xed/0x340 [ 1182.709979] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1182.709999] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1182.710018] ? __create_object+0x59/0x80 [ 1182.710040] alloc_pages_noprof+0x9d/0x180 [ 1182.710060] get_zeroed_page_noprof+0x18/0xb0 [ 1182.710074] mon_alloc_buff+0xed/0x250 [ 1182.710097] mon_bin_open+0x209/0x4a0 [ 1182.710116] ? __pfx_mon_bin_open+0x10/0x10 [ 1182.710133] chrdev_open+0x234/0x690 [ 1182.710150] ? __pfx_chrdev_open+0x10/0x10 [ 1182.710165] ? lock_release+0xc8/0x290 [ 1182.710187] do_dentry_open+0x71c/0x1420 [ 1182.710203] ? __pfx_chrdev_open+0x10/0x10 [ 1182.710220] ? inode_permission+0x134/0x610 [ 1182.710240] vfs_open+0x82/0x3f0 [ 1182.710257] ? may_open+0x1f3/0x420 [ 1182.710270] path_openat+0x1c3f/0x2880 [ 1182.710294] ? __pfx_path_openat+0x10/0x10 [ 1182.710308] ? perf_trace_lock_acquire+0xc9/0x700 [ 1182.710330] do_filp_open+0x1e8/0x450 [ 1182.710345] ? __pfx_do_filp_open+0x10/0x10 [ 1182.710368] ? find_held_lock+0x2b/0x80 [ 1182.710380] ? alloc_fd+0x2c1/0x560 [ 1182.710393] ? lock_release+0xc8/0x290 [ 1182.710413] ? alloc_fd+0x2c1/0x560 [ 1182.710433] do_sys_openat2+0x104/0x1b0 [ 1182.710451] ? __pfx_do_sys_openat2+0x10/0x10 [ 1182.710472] ? __fget_files+0x20d/0x3b0 [ 1182.710491] __x64_sys_openat+0x142/0x200 [ 1182.710503] ? __pfx___x64_sys_openat+0x10/0x10 [ 1182.710517] ? ksys_write+0x1a3/0x240 [ 1182.710540] do_syscall_64+0xbf/0x390 [ 1182.710556] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1182.710567] RIP: 0033:0x7fc66387fa04 [ 1182.710576] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1182.710587] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1182.710599] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1182.710607] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1182.710614] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1182.710621] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1182.710627] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1182.710647] [ 1182.730017] loop4: detected capacity change from 0 to 512 [ 1182.771884] FAULT_INJECTION: forcing a failure. [ 1182.771884] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:42:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, 0x0) 19:42:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1182.773237] CPU: 1 UID: 0 PID: 9165 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1182.773253] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1182.773261] Call Trace: [ 1182.773265] [ 1182.773270] dump_stack_lvl+0xfa/0x120 [ 1182.773289] should_fail_ex+0x4d7/0x5e0 [ 1182.773307] should_fail_alloc_page+0xe0/0x110 [ 1182.773326] prepare_alloc_pages+0x1eb/0x550 [ 1182.773346] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1182.773364] ? find_held_lock+0x2b/0x80 [ 1182.773380] ? lock_release+0xc8/0x290 [ 1182.773398] ? 0xffffffffa0000000 [ 1182.773409] ? perf_trace_lock_acquire+0xc9/0x700 [ 1182.773429] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1182.773450] ? perf_trace_lock+0xb5/0x5d0 [ 1182.773470] ? __pfx_perf_trace_lock+0x10/0x10 [ 1182.773487] ? lock_is_held_type+0x9e/0x120 [ 1182.773503] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1182.773531] ? policy_nodemask+0xeb/0x4e0 [ 1182.773554] alloc_pages_mpol+0xed/0x340 [ 1182.773573] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1182.773590] ? filemap_get_entry+0x1bb/0x3b0 [ 1182.773607] ? __pfx_filemap_get_entry+0x10/0x10 [ 1182.773629] folio_alloc_mpol_noprof+0x38/0xa0 [ 1182.773645] shmem_alloc_folio+0x11b/0x140 [ 1182.773661] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0 [ 1182.773686] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 1182.773705] ? __pfx_perf_trace_lock+0x10/0x10 [ 1182.773721] ? simple_xattr_get+0x173/0x1d0 [ 1182.773743] shmem_write_begin+0x147/0x2e0 [ 1182.773760] ? __pfx_shmem_write_begin+0x10/0x10 [ 1182.773774] ? timestamp_truncate+0x1eb/0x2f0 [ 1182.773791] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1182.773810] ? __pfx_timestamp_truncate+0x10/0x10 [ 1182.773829] generic_perform_write+0x391/0x810 [ 1182.773851] ? __pfx_generic_perform_write+0x10/0x10 [ 1182.773867] ? inode_needs_update_time.part.0+0x170/0x270 [ 1182.773889] shmem_file_write_iter+0x111/0x140 [ 1182.773903] vfs_write+0xbe9/0x1150 [ 1182.773920] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1182.773933] ? __fget_files+0x34/0x3b0 [ 1182.773946] ? __pfx_vfs_write+0x10/0x10 [ 1182.773977] __x64_sys_pwrite64+0x1f1/0x260 [ 1182.773993] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1182.774009] ? fput+0x6a/0x100 [ 1182.774031] do_syscall_64+0xbf/0x390 [ 1182.774047] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1182.774059] RIP: 0033:0x7f9df1fc0ab7 [ 1182.774068] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1182.774080] RSP: 002b:00007f9def582f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1182.774091] RAX: ffffffffffffffda RBX: 00007f9df2057970 RCX: 00007f9df1fc0ab7 [ 1182.774100] RDX: 0000000000000059 RSI: 0000000020010000 RDI: 0000000000000004 [ 1182.774107] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1182.774114] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1182.774121] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1182.774141] 19:42:27 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac", 0x8}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:27 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 16) [ 1182.876334] loop6: detected capacity change from 0 to 512 19:42:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 15) 19:42:27 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, 0x0) [ 1182.941830] FAULT_INJECTION: forcing a failure. [ 1182.941830] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1182.943767] CPU: 0 UID: 0 PID: 9173 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1182.943797] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1182.943809] Call Trace: [ 1182.943816] [ 1182.943825] dump_stack_lvl+0xfa/0x120 [ 1182.943854] should_fail_ex+0x4d7/0x5e0 [ 1182.943884] should_fail_alloc_page+0xe0/0x110 [ 1182.943916] prepare_alloc_pages+0x1eb/0x550 [ 1182.943951] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1182.943991] ? stack_trace_save+0x8e/0xc0 [ 1182.944026] ? stack_depot_save_flags+0x2c/0xa20 [ 1182.944066] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1182.944101] ? kasan_save_stack+0x24/0x50 [ 1182.944128] ? kasan_save_track+0x14/0x30 [ 1182.944154] ? __kasan_kmalloc+0x7f/0x90 [ 1182.944185] ? do_filp_open+0x1e8/0x450 [ 1182.944210] ? do_sys_openat2+0x104/0x1b0 [ 1182.944241] ? __x64_sys_openat+0x142/0x200 [ 1182.944259] ? do_syscall_64+0xbf/0x390 [ 1182.944283] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1182.944307] ? __pfx_perf_trace_lock+0x10/0x10 [ 1182.944341] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1182.944370] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1182.944408] ? policy_nodemask+0xeb/0x4e0 [ 1182.944447] alloc_pages_mpol+0xed/0x340 [ 1182.944481] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1182.944525] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1182.944560] ? __create_object+0x59/0x80 [ 1182.944599] alloc_pages_noprof+0x9d/0x180 [ 1182.944636] get_zeroed_page_noprof+0x18/0xb0 [ 1182.944661] mon_alloc_buff+0xed/0x250 [ 1182.944702] mon_bin_open+0x209/0x4a0 [ 1182.944736] ? __pfx_mon_bin_open+0x10/0x10 [ 1182.944768] chrdev_open+0x234/0x690 [ 1182.944800] ? __pfx_chrdev_open+0x10/0x10 [ 1182.944830] ? lock_release+0xc8/0x290 [ 1182.944870] do_dentry_open+0x71c/0x1420 [ 1182.944900] ? __pfx_chrdev_open+0x10/0x10 [ 1182.944929] ? inode_permission+0x134/0x610 [ 1182.944965] vfs_open+0x82/0x3f0 [ 1182.944996] ? may_open+0x1f3/0x420 [ 1182.945020] path_openat+0x1c3f/0x2880 [ 1182.945063] ? __pfx_path_openat+0x10/0x10 [ 1182.945089] ? perf_trace_lock_acquire+0xc9/0x700 [ 1182.945131] do_filp_open+0x1e8/0x450 [ 1182.945157] ? __pfx_do_filp_open+0x10/0x10 [ 1182.945200] ? find_held_lock+0x2b/0x80 [ 1182.945222] ? alloc_fd+0x2c1/0x560 [ 1182.945245] ? lock_release+0xc8/0x290 [ 1182.945282] ? alloc_fd+0x2c1/0x560 [ 1182.945320] do_sys_openat2+0x104/0x1b0 [ 1182.945353] ? __pfx_do_sys_openat2+0x10/0x10 [ 1182.945384] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1182.945418] ? perf_trace_preemptirq_template+0x259/0x430 [ 1182.945452] __x64_sys_openat+0x142/0x200 [ 1182.945473] ? __pfx___x64_sys_openat+0x10/0x10 [ 1182.945513] do_syscall_64+0xbf/0x390 [ 1182.945540] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1182.945561] RIP: 0033:0x7fc66387fa04 [ 1182.945577] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1182.945598] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1182.945618] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1182.945633] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1182.945646] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1182.945658] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1182.945671] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1182.945707] [ 1182.957967] FAULT_INJECTION: forcing a failure. [ 1182.957967] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1182.961200] loop2: detected capacity change from 0 to 512 [ 1182.961412] CPU: 1 UID: 0 PID: 9178 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1182.961429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1182.961436] Call Trace: [ 1182.961441] [ 1182.961446] dump_stack_lvl+0xfa/0x120 [ 1182.961465] should_fail_ex+0x4d7/0x5e0 [ 1182.961480] ? page_copy_sane+0xce/0x2b0 [ 1182.961495] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 1182.961522] ? simple_xattr_get+0x173/0x1d0 [ 1182.961544] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 1182.961558] ? shmem_write_begin+0x15e/0x2e0 [ 1182.961577] ? __pfx_shmem_write_begin+0x10/0x10 [ 1182.961592] ? timestamp_truncate+0x1eb/0x2f0 [ 1182.961609] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1182.961628] ? __pfx_timestamp_truncate+0x10/0x10 [ 1182.961647] generic_perform_write+0x1d7/0x810 [ 1182.961670] ? __pfx_generic_perform_write+0x10/0x10 [ 1182.961686] ? inode_needs_update_time.part.0+0x170/0x270 [ 1182.961708] shmem_file_write_iter+0x111/0x140 [ 1182.961723] vfs_write+0xbe9/0x1150 [ 1182.961740] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1182.961753] ? __fget_files+0x34/0x3b0 [ 1182.961767] ? __pfx_vfs_write+0x10/0x10 [ 1182.961798] __x64_sys_pwrite64+0x1f1/0x260 [ 1182.961815] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1182.961830] ? fput+0x6a/0x100 [ 1182.961853] do_syscall_64+0xbf/0x390 [ 1182.961870] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1182.961883] RIP: 0033:0x7f9df1fc0ab7 [ 1182.961892] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1182.961904] RSP: 002b:00007f9def582f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1182.961915] RAX: ffffffffffffffda RBX: 00007f9df2057970 RCX: 00007f9df1fc0ab7 [ 1182.961923] RDX: 0000000000000059 RSI: 0000000020010000 RDI: 0000000000000004 [ 1182.961930] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1182.961938] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1182.961945] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1182.961965] [ 1182.983800] loop4: detected capacity change from 0 to 512 [ 1183.055102] EXT4-fs (loop2): failed to parse options in superblock: [ 1183.064281] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1183.065631] EXT4-fs (loop2): group descriptors corrupted! 19:42:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:39 executing program 6: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, 0x0) 19:42:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 16) 19:42:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:39 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 17) 19:42:39 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac", 0x8}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:39 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1194.962272] loop4: detected capacity change from 0 to 512 [ 1194.965763] FAULT_INJECTION: forcing a failure. [ 1194.965763] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1194.967517] CPU: 1 UID: 0 PID: 9195 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1194.967546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.967559] Call Trace: [ 1194.967567] [ 1194.967576] dump_stack_lvl+0xfa/0x120 [ 1194.967607] should_fail_ex+0x4d7/0x5e0 [ 1194.967630] ? page_copy_sane+0xce/0x2b0 [ 1194.967656] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 1194.967706] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 1194.967732] ? shmem_write_begin+0x15e/0x2e0 [ 1194.967765] ? __pfx_shmem_write_begin+0x10/0x10 [ 1194.967791] ? timestamp_truncate+0x1eb/0x2f0 [ 1194.967821] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1194.967856] ? __pfx_timestamp_truncate+0x10/0x10 [ 1194.967891] generic_perform_write+0x1d7/0x810 [ 1194.967932] ? __pfx_generic_perform_write+0x10/0x10 [ 1194.967960] ? inode_needs_update_time.part.0+0x170/0x270 [ 1194.968001] shmem_file_write_iter+0x111/0x140 [ 1194.968029] vfs_write+0xbe9/0x1150 [ 1194.968058] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1194.968082] ? __fget_files+0x34/0x3b0 [ 1194.968106] ? __pfx_vfs_write+0x10/0x10 [ 1194.968163] __x64_sys_pwrite64+0x1f1/0x260 [ 1194.968193] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1194.968221] ? fput+0x6a/0x100 [ 1194.968261] do_syscall_64+0xbf/0x390 [ 1194.968291] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1194.968314] RIP: 0033:0x7f9df1fc0ab7 [ 1194.968330] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1194.968351] RSP: 002b:00007f9def582f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1194.968372] RAX: ffffffffffffffda RBX: 00007f9df2057970 RCX: 00007f9df1fc0ab7 [ 1194.968386] RDX: 00000000000000a1 RSI: 00000000200002c0 RDI: 0000000000000004 [ 1194.968399] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1194.968413] R10: 0000000000000560 R11: 0000000000000293 R12: 0000000000000004 [ 1194.968425] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1194.968461] [ 1194.980080] loop2: detected capacity change from 0 to 512 [ 1195.010131] FAULT_INJECTION: forcing a failure. [ 1195.010131] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1195.011950] CPU: 0 UID: 0 PID: 9201 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1195.011984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.011999] Call Trace: [ 1195.012007] [ 1195.012016] dump_stack_lvl+0xfa/0x120 [ 1195.012048] should_fail_ex+0x4d7/0x5e0 [ 1195.012080] should_fail_alloc_page+0xe0/0x110 [ 1195.012113] prepare_alloc_pages+0x1eb/0x550 [ 1195.012149] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1195.012190] ? stack_trace_save+0x8e/0xc0 [ 1195.012225] ? stack_depot_save_flags+0x2c/0xa20 [ 1195.012265] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1195.012301] ? kasan_save_stack+0x24/0x50 [ 1195.012328] ? kasan_save_track+0x14/0x30 [ 1195.012355] ? __kasan_kmalloc+0x7f/0x90 [ 1195.012386] ? do_filp_open+0x1e8/0x450 [ 1195.012412] ? do_sys_openat2+0x104/0x1b0 [ 1195.012444] ? __x64_sys_openat+0x142/0x200 [ 1195.012462] ? do_syscall_64+0xbf/0x390 [ 1195.012487] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1195.012519] ? __pfx_perf_trace_lock+0x10/0x10 [ 1195.012554] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 19:42:39 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14", 0xc}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1195.012583] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1195.012621] ? policy_nodemask+0xeb/0x4e0 [ 1195.012661] alloc_pages_mpol+0xed/0x340 [ 1195.012697] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1195.012733] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1195.012768] ? __create_object+0x59/0x80 [ 1195.012807] alloc_pages_noprof+0x9d/0x180 [ 1195.012845] get_zeroed_page_noprof+0x18/0xb0 [ 1195.012870] mon_alloc_buff+0xed/0x250 [ 1195.012911] mon_bin_open+0x209/0x4a0 [ 1195.012946] ? __pfx_mon_bin_open+0x10/0x10 [ 1195.012978] chrdev_open+0x234/0x690 [ 1195.013008] ? __pfx_chrdev_open+0x10/0x10 [ 1195.013036] ? lock_release+0xc8/0x290 [ 1195.013077] do_dentry_open+0x71c/0x1420 [ 1195.013106] ? __pfx_chrdev_open+0x10/0x10 [ 1195.013136] ? inode_permission+0x134/0x610 [ 1195.013173] vfs_open+0x82/0x3f0 [ 1195.013204] ? may_open+0x1f3/0x420 [ 1195.013228] path_openat+0x1c3f/0x2880 [ 1195.013272] ? __pfx_path_openat+0x10/0x10 [ 1195.013298] ? perf_trace_lock_acquire+0xc9/0x700 [ 1195.013341] do_filp_open+0x1e8/0x450 [ 1195.013367] ? __pfx_do_filp_open+0x10/0x10 [ 1195.013410] ? find_held_lock+0x2b/0x80 [ 1195.013432] ? alloc_fd+0x2c1/0x560 [ 1195.013456] ? lock_release+0xc8/0x290 [ 1195.013493] ? alloc_fd+0x2c1/0x560 [ 1195.013531] do_sys_openat2+0x104/0x1b0 [ 1195.013565] ? __pfx_do_sys_openat2+0x10/0x10 [ 1195.013597] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1195.013631] ? perf_trace_preemptirq_template+0x259/0x430 [ 1195.013665] __x64_sys_openat+0x142/0x200 [ 1195.013686] ? __pfx___x64_sys_openat+0x10/0x10 [ 1195.013726] do_syscall_64+0xbf/0x390 [ 1195.013753] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1195.013774] RIP: 0033:0x7fc66387fa04 [ 1195.013791] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1195.013811] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1195.013832] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1195.013846] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1195.013859] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1195.013872] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1195.013884] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1195.013920] [ 1195.114394] EXT4-fs (loop2): failed to parse options in superblock: 19:42:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1195.129426] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1195.131106] EXT4-fs (loop2): group descriptors corrupted! 19:42:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 17) 19:42:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1195.304200] FAULT_INJECTION: forcing a failure. [ 1195.304200] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.306137] CPU: 1 UID: 0 PID: 9209 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1195.306167] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.306179] Call Trace: [ 1195.306187] [ 1195.306195] dump_stack_lvl+0xfa/0x120 [ 1195.306226] should_fail_ex+0x4d7/0x5e0 [ 1195.306254] ? getname_flags.part.0+0x48/0x540 [ 1195.306288] should_failslab+0xc2/0x120 [ 1195.306317] kmem_cache_alloc_noprof+0x80/0x690 [ 1195.306365] ? getname_flags.part.0+0x48/0x540 [ 1195.306397] getname_flags.part.0+0x48/0x540 [ 1195.306435] getname_flags+0x95/0xe0 [ 1195.306462] do_sys_openat2+0x9f/0x1b0 [ 1195.306496] ? __pfx_do_sys_openat2+0x10/0x10 [ 1195.306555] __x64_sys_openat+0x142/0x200 [ 1195.306576] ? __pfx___x64_sys_openat+0x10/0x10 [ 1195.306602] ? fput+0x6a/0x100 [ 1195.306642] do_syscall_64+0xbf/0x390 [ 1195.306671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1195.306694] RIP: 0033:0x7f9df1fc0a04 [ 1195.306711] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1195.306731] RSP: 002b:00007f9def582ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1195.306751] RAX: ffffffffffffffda RBX: 00007f9df2057970 RCX: 00007f9df1fc0a04 [ 1195.306766] RDX: 0000000000000002 RSI: 00007f9def583000 RDI: 00000000ffffff9c [ 1195.306780] RBP: 00007f9def583000 R08: 0000000000000000 R09: ffffffffffffffff [ 1195.306793] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1195.306805] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1195.306861] 19:42:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:39 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 18) [ 1195.353197] loop6: detected capacity change from 0 to 512 19:42:39 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1195.408113] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1195.426974] FAULT_INJECTION: forcing a failure. [ 1195.426974] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1195.428868] CPU: 0 UID: 0 PID: 9214 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1195.428898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.428910] Call Trace: [ 1195.428918] [ 1195.428926] dump_stack_lvl+0xfa/0x120 [ 1195.428957] should_fail_ex+0x4d7/0x5e0 [ 1195.428987] should_fail_alloc_page+0xe0/0x110 [ 1195.429019] prepare_alloc_pages+0x1eb/0x550 [ 1195.429054] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1195.429095] ? stack_trace_save+0x8e/0xc0 [ 1195.429129] ? stack_depot_save_flags+0x2c/0xa20 [ 1195.429168] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1195.429204] ? kasan_save_stack+0x24/0x50 [ 1195.429231] ? kasan_save_track+0x14/0x30 [ 1195.429257] ? __kasan_kmalloc+0x7f/0x90 [ 1195.429288] ? do_filp_open+0x1e8/0x450 [ 1195.429313] ? do_sys_openat2+0x104/0x1b0 [ 1195.429344] ? __x64_sys_openat+0x142/0x200 [ 1195.429361] ? do_syscall_64+0xbf/0x390 [ 1195.429386] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1195.429409] ? __pfx_perf_trace_lock+0x10/0x10 [ 1195.429443] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1195.429472] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1195.429517] ? policy_nodemask+0xeb/0x4e0 [ 1195.429556] alloc_pages_mpol+0xed/0x340 [ 1195.429591] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1195.429627] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1195.429661] ? __create_object+0x59/0x80 [ 1195.429699] alloc_pages_noprof+0x9d/0x180 [ 1195.429736] get_zeroed_page_noprof+0x18/0xb0 [ 1195.429761] mon_alloc_buff+0xed/0x250 [ 1195.429802] mon_bin_open+0x209/0x4a0 [ 1195.429836] ? __pfx_mon_bin_open+0x10/0x10 [ 1195.429867] chrdev_open+0x234/0x690 [ 1195.429896] ? __pfx_chrdev_open+0x10/0x10 [ 1195.429924] ? lock_release+0xc8/0x290 [ 1195.429964] do_dentry_open+0x71c/0x1420 [ 1195.429994] ? __pfx_chrdev_open+0x10/0x10 [ 1195.430023] ? inode_permission+0x134/0x610 [ 1195.430059] vfs_open+0x82/0x3f0 [ 1195.430089] ? may_open+0x1f3/0x420 [ 1195.430113] path_openat+0x1c3f/0x2880 [ 1195.430157] ? __pfx_path_openat+0x10/0x10 [ 1195.430183] ? perf_trace_lock_acquire+0xc9/0x700 [ 1195.430225] do_filp_open+0x1e8/0x450 [ 1195.430251] ? __pfx_do_filp_open+0x10/0x10 [ 1195.430293] ? find_held_lock+0x2b/0x80 [ 1195.430315] ? alloc_fd+0x2c1/0x560 [ 1195.430338] ? lock_release+0xc8/0x290 [ 1195.430375] ? alloc_fd+0x2c1/0x560 [ 1195.430412] do_sys_openat2+0x104/0x1b0 [ 1195.430446] ? __pfx_do_sys_openat2+0x10/0x10 [ 1195.430477] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1195.430511] ? perf_trace_preemptirq_template+0x259/0x430 [ 1195.430546] __x64_sys_openat+0x142/0x200 [ 1195.430566] ? __pfx___x64_sys_openat+0x10/0x10 [ 1195.430606] do_syscall_64+0xbf/0x390 [ 1195.430633] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1195.430654] RIP: 0033:0x7fc66387fa04 [ 1195.430670] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1195.430691] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1195.430711] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1195.430726] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1195.430739] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1195.430751] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1195.430764] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1195.430769] loop2: detected capacity change from 0 to 512 [ 1195.430800] [ 1195.536196] EXT4-fs (loop2): failed to parse options in superblock: [ 1195.538628] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1195.540087] EXT4-fs (loop2): group descriptors corrupted! 19:42:52 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14", 0xc}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:52 executing program 6: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:42:52 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:52 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 19) 19:42:52 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 18) 19:42:52 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:42:52 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1208.430172] FAULT_INJECTION: forcing a failure. [ 1208.430172] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1208.431316] CPU: 0 UID: 0 PID: 9236 Comm: syz-executor.0 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1208.431333] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.431340] Call Trace: [ 1208.431345] [ 1208.431350] dump_stack_lvl+0xfa/0x120 [ 1208.431370] should_fail_ex+0x4d7/0x5e0 [ 1208.431389] should_fail_alloc_page+0xe0/0x110 [ 1208.431408] prepare_alloc_pages+0x1eb/0x550 [ 1208.431427] __alloc_frozen_pages_noprof+0x17f/0x1f20 19:42:52 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1208.431449] ? stack_trace_save+0x8e/0xc0 [ 1208.431470] ? stack_depot_save_flags+0x2c/0xa20 [ 1208.431491] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1208.431515] ? kasan_save_stack+0x24/0x50 [ 1208.431531] ? kasan_save_track+0x14/0x30 [ 1208.431545] ? __kasan_kmalloc+0x7f/0x90 [ 1208.431562] ? do_filp_open+0x1e8/0x450 [ 1208.431576] ? do_sys_openat2+0x104/0x1b0 [ 1208.431594] ? __x64_sys_openat+0x142/0x200 [ 1208.431604] ? do_syscall_64+0xbf/0x390 [ 1208.431618] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1208.431632] ? __pfx_perf_trace_lock+0x10/0x10 [ 1208.431651] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1208.431668] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1208.431689] ? policy_nodemask+0xeb/0x4e0 [ 1208.431711] alloc_pages_mpol+0xed/0x340 [ 1208.431730] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1208.431749] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1208.431769] ? __create_object+0x59/0x80 [ 1208.431795] alloc_pages_noprof+0x9d/0x180 [ 1208.431816] get_zeroed_page_noprof+0x18/0xb0 [ 1208.431829] mon_alloc_buff+0xed/0x250 [ 1208.431853] mon_bin_open+0x209/0x4a0 [ 1208.431872] ? __pfx_mon_bin_open+0x10/0x10 [ 1208.431889] chrdev_open+0x234/0x690 [ 1208.431906] ? __pfx_chrdev_open+0x10/0x10 [ 1208.431921] ? lock_release+0xc8/0x290 [ 1208.431943] do_dentry_open+0x71c/0x1420 [ 1208.431959] ? __pfx_chrdev_open+0x10/0x10 [ 1208.431975] ? inode_permission+0x134/0x610 [ 1208.431996] vfs_open+0x82/0x3f0 [ 1208.432012] ? may_open+0x1f3/0x420 [ 1208.432025] path_openat+0x1c3f/0x2880 [ 1208.432049] ? __pfx_path_openat+0x10/0x10 [ 1208.432063] ? perf_trace_lock_acquire+0xc9/0x700 [ 1208.432085] do_filp_open+0x1e8/0x450 [ 1208.432100] ? __pfx_do_filp_open+0x10/0x10 [ 1208.432123] ? find_held_lock+0x2b/0x80 [ 1208.432135] ? alloc_fd+0x2c1/0x560 [ 1208.432148] ? lock_release+0xc8/0x290 [ 1208.432168] ? alloc_fd+0x2c1/0x560 [ 1208.432188] do_sys_openat2+0x104/0x1b0 [ 1208.432206] ? __pfx_do_sys_openat2+0x10/0x10 [ 1208.432223] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1208.432242] ? perf_trace_preemptirq_template+0x259/0x430 [ 1208.432261] __x64_sys_openat+0x142/0x200 [ 1208.432272] ? __pfx___x64_sys_openat+0x10/0x10 [ 1208.432294] do_syscall_64+0xbf/0x390 [ 1208.432308] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1208.432320] RIP: 0033:0x7fc66387fa04 [ 1208.432329] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1208.432341] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1208.432352] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1208.432361] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1208.432368] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1208.432375] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1208.432381] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1208.432401] [ 1208.434993] loop2: detected capacity change from 0 to 512 19:42:52 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1208.510129] EXT4-fs (loop2): failed to parse options in superblock: [ 1208.514722] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1208.515445] EXT4-fs (loop2): group descriptors corrupted! 19:43:01 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:43:01 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14", 0xc}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 19) 19:43:01 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:01 executing program 6: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:01 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9", 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:01 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 20) 19:43:01 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169", 0xe}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:01 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1217.615785] FAULT_INJECTION: forcing a failure. [ 1217.615785] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1217.616763] CPU: 1 UID: 0 PID: 9257 Comm: syz-executor.3 Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1217.616779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1217.616786] Call Trace: [ 1217.616791] [ 1217.616796] dump_stack_lvl+0xfa/0x120 [ 1217.616816] should_fail_ex+0x4d7/0x5e0 [ 1217.616834] strncpy_from_user+0x3b/0x2f0 [ 1217.616855] getname_flags.part.0+0x8d/0x540 [ 1217.616877] getname_flags+0x95/0xe0 [ 1217.616893] do_sys_openat2+0x9f/0x1b0 [ 1217.616912] ? __pfx_do_sys_openat2+0x10/0x10 [ 1217.616940] __x64_sys_openat+0x142/0x200 [ 1217.616952] ? __pfx___x64_sys_openat+0x10/0x10 [ 1217.616965] ? fput+0x6a/0x100 [ 1217.616987] do_syscall_64+0xbf/0x390 [ 1217.617005] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1217.617018] RIP: 0033:0x7f9df1fc0a04 [ 1217.617028] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1217.617040] RSP: 002b:00007f9def582ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1217.617051] RAX: ffffffffffffffda RBX: 00007f9df2057970 RCX: 00007f9df1fc0a04 ** 1 printk messages dropped ** [ 1217.617067] RBP: 00007f9def583000 R08: 0000000000000000 R09: ffffffffffffffff [ 1217.617075] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1217.617082] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1217.617101] [ 1217.626141] ------------[ cut here ]------------ [ 1217.626184] WARNING: kernel/printk/printk_ringbuffer.c:1278 at get_data+0x364/0x400, CPU#1: systemd-udevd/112 [ 1217.626213] Modules linked in: [ 1217.626236] CPU: 1 UID: 0 PID: 112 Comm: systemd-udevd Not tainted 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1217.626250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1217.626257] RIP: 0010:get_data+0x364/0x400 [ 1217.626273] Code: e8 83 e0 07 83 c0 03 38 d0 0f 8c be fe ff ff 84 d2 0f 84 b6 fe ff ff 48 89 ef e8 37 89 5b 00 e9 a9 fe ff ff e8 fd b6 1e 00 90 <0f> 0b 90 45 31 e4 e9 3b ff ff ff e8 ec b6 1e 00 90 0f 0b 90 45 31 [ 1217.626285] RSP: 0018:ffff88806cf08720 EFLAGS: 00010046 [ 1217.626295] RAX: 0000000080010001 RBX: ffff88806cf08838 RCX: ffffffff81555256 [ 1217.626303] RDX: ffff888015ec3700 RSI: ffffffff81555423 RDI: 0000000000000006 [ 1217.626311] RBP: ffff88806cf08800 R08: 0000000000000000 R09: 0000000000000000 [ 1217.626319] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff85d30690 [ 1217.626327] R13: 00003fffffffffff R14: 0000000000000000 R15: 0000000000000000 [ 1217.626336] FS: 00007fddc20ae8c0(0000) GS:ffff8880e54f4000(0000) knlGS:0000000000000000 [ 1217.626348] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1217.626356] CR2: 00007f9def582f78 CR3: 000000000b7d9000 CR4: 0000000000350ef0 [ 1217.626364] Call Trace: [ 1217.626368] [ 1217.626377] _prb_read_valid+0x2f3/0x830 [ 1217.626402] ? __pfx__prb_read_valid+0x10/0x10 [ 1217.626421] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.626439] ? __asan_memcpy+0x3d/0x60 [ 1217.626459] ? perf_trace_lock+0xb5/0x5d0 [ 1217.626479] prb_read_valid+0x78/0xa0 [ 1217.626496] ? __pfx_prb_read_valid+0x10/0x10 [ 1217.626514] ? io_serial_in+0x10/0x80 [ 1217.626531] printk_get_next_message+0x10b/0x570 [ 1217.626546] ? __pfx_printk_get_next_message+0x10/0x10 [ 1217.626561] ? __lock_acquire+0x694/0x1b70 [ 1217.626587] ? lock_acquire+0x15e/0x2f0 [ 1217.626601] ? console_flush_one_record+0x100/0xb20 [ 1217.626618] ? lock_is_held_type+0x9e/0x120 [ 1217.626634] console_flush_one_record+0x64f/0xb20 [ 1217.626652] ? __pfx_console_flush_one_record+0x10/0x10 [ 1217.626667] ? __lock_acquire+0x694/0x1b70 [ 1217.626688] ? do_raw_spin_lock+0x123/0x260 [ 1217.626710] __console_flush_and_unlock+0xb1/0x1d0 [ 1217.626723] ? __pfx___console_flush_and_unlock+0x10/0x10 [ 1217.626736] ? do_raw_spin_unlock+0x53/0x220 [ 1217.626749] ? is_printk_cpu_sync_owner+0x32/0x40 [ 1217.626763] ? is_printk_legacy_deferred+0x67/0x80 [ 1217.626780] wake_up_klogd_work_func+0x17c/0x1e0 [ 1217.626793] ? __pfx_wake_up_klogd_work_func+0x10/0x10 [ 1217.626807] ? __timekeeping_advance.constprop.0+0x6bd/0xa10 [ 1217.626831] irq_work_single+0x128/0x260 [ 1217.626852] irq_work_run_list+0x91/0xc0 [ 1217.626871] update_process_times+0x12f/0x210 [ 1217.626886] tick_nohz_handler+0x414/0x6d0 [ 1217.626902] ? do_raw_spin_unlock+0x53/0x220 [ 1217.626912] ? __pfx_tick_nohz_handler+0x10/0x10 [ 1217.626928] __hrtimer_run_queues+0x60f/0xac0 [ 1217.626951] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 1217.626963] ? ktime_get_update_offsets_now+0x252/0x3c0 [ 1217.626989] hrtimer_interrupt+0x369/0x830 [ 1217.627012] __sysvec_apic_timer_interrupt+0xbb/0x330 [ 1217.627031] sysvec_apic_timer_interrupt+0x6b/0x80 [ 1217.627050] [ 1217.627054] [ 1217.627059] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1217.627072] RIP: 0010:strlen+0x0/0xa0 [ 1217.627085] Code: 24 08 48 89 3c 24 e8 6f eb f3 fc 48 8b 74 24 08 48 8b 3c 24 eb b8 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 b8 00 00 00 00 00 fc ff df 55 48 89 fa 48 89 fd 53 [ 1217.627096] RSP: 0018:ffff888016547418 EFLAGS: 00000286 [ 1217.627107] RAX: ffffffff84e81c60 RBX: 1ffff11002ca8e8d RCX: 0000000000000000 [ 1217.627116] RDX: dffffc0000000000 RSI: ffffffff85e1dca0 RDI: ffffffff84e95400 [ 1217.627134] RBP: ffff888016547510 R08: 0000000000000002 R09: 0000000000000000 [ 1217.627141] R10: ffffffff85d248e0 R11: 0000000000000001 R12: ffffffff85e1dcb8 [ 1217.627149] R13: ffff8880165474e8 R14: 0000000000000000 R15: ffff888016547668 [ 1217.627170] perf_trace_lock_acquire+0xc9/0x700 [ 1217.627189] ? perf_trace_lock+0xb5/0x5d0 [ 1217.627207] ? __pfx_perf_trace_lock_acquire+0x10/0x10 [ 1217.627224] ? __pfx_perf_trace_lock+0x10/0x10 [ 1217.627243] ? lock_acquire+0x15e/0x2f0 [ 1217.627262] lock_acquire+0xc5/0x2f0 [ 1217.627278] ? unwind_next_frame+0xb9/0x2540 [ 1217.627292] ? 0xffffffffa0000000 [ 1217.627305] unwind_next_frame+0xcd/0x2540 [ 1217.627315] ? unwind_next_frame+0xb9/0x2540 [ 1217.627325] ? __unwind_start+0x592/0x7c0 [ 1217.627336] ? __kernel_text_address+0xd/0x40 [ 1217.627353] ? get_stack_info_noinstr+0x16/0xf0 [ 1217.627372] __unwind_start+0x517/0x7c0 [ 1217.627384] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1217.627405] arch_stack_walk+0x62/0xf0 [ 1217.627424] ? __unwind_start+0x592/0x7c0 [ 1217.627438] stack_trace_save+0x8e/0xc0 [ 1217.627455] ? __pfx_stack_trace_save+0x10/0x10 [ 1217.627474] ? __is_insn_slot_addr+0x136/0x290 [ 1217.627489] ? lock_release+0xc8/0x290 [ 1217.627507] kasan_save_stack+0x24/0x50 [ 1217.627523] ? __is_insn_slot_addr+0x140/0x290 [ 1217.627539] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.627555] ? __kernel_text_address+0xd/0x40 [ 1217.627576] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.627596] ? __lock_acquire+0xc65/0x1b70 [ 1217.627612] ? perf_trace_lock+0xb5/0x5d0 [ 1217.627630] ? obj_cgroup_charge_account+0x11a/0x6e0 [ 1217.627644] ? __pfx_perf_trace_lock+0x10/0x10 [ 1217.627662] ? lock_acquire+0x15e/0x2f0 [ 1217.627677] ? fs_reclaim_acquire+0xae/0x150 [ 1217.627698] kasan_save_track+0x14/0x30 [ 1217.627713] __kasan_slab_alloc+0x59/0x70 [ 1217.627731] kmem_cache_alloc_noprof+0x213/0x690 [ 1217.627752] ? __create_object+0x59/0x80 [ 1217.627774] ? security_file_alloc+0x35/0x130 [ 1217.627791] security_file_alloc+0x35/0x130 [ 1217.627807] init_file+0x95/0x4c0 [ 1217.627825] alloc_empty_file+0x76/0x1e0 [ 1217.627844] path_openat+0xe0/0x2880 [ 1217.627858] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.627875] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.627897] ? __pfx_path_openat+0x10/0x10 [ 1217.627911] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.627934] do_filp_open+0x1e8/0x450 [ 1217.627948] ? __pfx_do_filp_open+0x10/0x10 [ 1217.627971] ? find_held_lock+0x2b/0x80 [ 1217.627983] ? alloc_fd+0x2c1/0x560 [ 1217.627996] ? lock_release+0xc8/0x290 [ 1217.628015] ? _raw_spin_unlock+0x1e/0x40 [ 1217.628033] ? alloc_fd+0x2c1/0x560 [ 1217.628053] do_sys_openat2+0x104/0x1b0 [ 1217.628070] ? __pfx_do_sys_openat2+0x10/0x10 [ 1217.628091] ? __pfx___seccomp_filter+0x10/0x10 [ 1217.628115] __x64_sys_openat+0x142/0x200 [ 1217.628127] ? __pfx___x64_sys_openat+0x10/0x10 [ 1217.628137] ? __pfx_fput_close_sync+0x10/0x10 [ 1217.628158] ? __secure_computing+0x18d/0x290 [ 1217.628174] do_syscall_64+0xbf/0x390 [ 1217.628189] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1217.628201] RIP: 0033:0x7fddc255dd62 [ 1217.628209] Code: c0 f6 c2 40 75 52 89 d0 45 31 d2 25 00 00 41 00 3d 00 00 41 00 74 41 64 8b 04 25 18 00 00 00 85 c0 75 65 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a2 00 00 00 48 8b 4c 24 38 64 48 2b 0c 25 [ 1217.628220] RSP: 002b:00007fffc1e0c4c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1217.628232] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fddc255dd62 [ 1217.628240] RDX: 00000000002a0000 RSI: 0000564f06339931 RDI: 000000000000000f [ 1217.628247] RBP: 0000564f06339930 R08: 0000564ee50538f0 R09: 00007fddc262dbe0 [ 1217.628255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000564f06339e54 [ 1217.628263] R13: 000000000000000f R14: 0000000000000008 R15: 0000564f06339931 [ 1217.628282] [ 1217.628287] irq event stamp: 12043078 [ 1217.628291] hardirqs last enabled at (12043077): [] _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1217.628312] hardirqs last disabled at (12043078): [] sysvec_apic_timer_interrupt+0xf/0x80 [ 1217.628332] softirqs last enabled at (12042908): [] handle_softirqs+0x50c/0x770 [ 1217.628347] softirqs last disabled at (12042853): [] __irq_exit_rcu+0xc4/0x100 [ 1217.628361] ---[ end trace 0000000000000000 ]--- [ 1217.711418] loop2: detected capacity change from 0 to 512 [ 1217.731319] EXT4-fs (loop2): failed to parse options in superblock: [ 1217.735229] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1217.736962] EXT4-fs (loop2): group descriptors corrupted! 19:43:02 executing program 6: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1217.768381] FAULT_INJECTION: forcing a failure. [ 1217.768381] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1217.770493] CPU: 0 UID: 0 PID: 9271 Comm: syz-executor.0 Tainted: G W 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1217.770538] Tainted: [W]=WARN [ 1217.770546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1217.770560] Call Trace: [ 1217.770568] [ 1217.770576] dump_stack_lvl+0xfa/0x120 [ 1217.770608] should_fail_ex+0x4d7/0x5e0 [ 1217.770641] should_fail_alloc_page+0xe0/0x110 [ 1217.770676] prepare_alloc_pages+0x1eb/0x550 [ 1217.770713] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1217.770757] ? stack_trace_save+0x8e/0xc0 [ 1217.770794] ? stack_depot_save_flags+0x2c/0xa20 [ 1217.770836] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1217.770874] ? kasan_save_stack+0x24/0x50 [ 1217.770904] ? kasan_save_track+0x14/0x30 [ 1217.770932] ? __kasan_kmalloc+0x7f/0x90 [ 1217.770965] ? do_filp_open+0x1e8/0x450 [ 1217.770992] ? do_sys_openat2+0x104/0x1b0 [ 1217.771025] ? __x64_sys_openat+0x142/0x200 [ 1217.771045] ? do_syscall_64+0xbf/0x390 [ 1217.771070] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1217.771096] ? __pfx_perf_trace_lock+0x10/0x10 [ 1217.771145] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1217.771176] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1217.771216] ? policy_nodemask+0xeb/0x4e0 [ 1217.771258] alloc_pages_mpol+0xed/0x340 [ 1217.771295] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1217.771334] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1217.771371] ? __create_object+0x59/0x80 [ 1217.771411] alloc_pages_noprof+0x9d/0x180 [ 1217.771452] get_zeroed_page_noprof+0x18/0xb0 [ 1217.771478] mon_alloc_buff+0xed/0x250 [ 1217.771522] mon_bin_open+0x209/0x4a0 [ 1217.771559] ? __pfx_mon_bin_open+0x10/0x10 [ 1217.771593] chrdev_open+0x234/0x690 [ 1217.771624] ? __pfx_chrdev_open+0x10/0x10 [ 1217.771655] ? lock_release+0xc8/0x290 [ 1217.771697] do_dentry_open+0x71c/0x1420 [ 1217.771730] ? __pfx_chrdev_open+0x10/0x10 [ 1217.771761] ? inode_permission+0x134/0x610 [ 1217.771800] vfs_open+0x82/0x3f0 [ 1217.771833] ? may_open+0x1f3/0x420 [ 1217.771859] path_openat+0x1c3f/0x2880 [ 1217.771905] ? __pfx_path_openat+0x10/0x10 [ 1217.771934] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.771979] do_filp_open+0x1e8/0x450 [ 1217.772007] ? __pfx_do_filp_open+0x10/0x10 [ 1217.772053] ? find_held_lock+0x2b/0x80 [ 1217.772076] ? alloc_fd+0x2c1/0x560 [ 1217.772101] ? lock_release+0xc8/0x290 [ 1217.772141] ? alloc_fd+0x2c1/0x560 [ 1217.772181] do_sys_openat2+0x104/0x1b0 [ 1217.772217] ? __pfx_do_sys_openat2+0x10/0x10 [ 1217.772251] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1217.772288] ? perf_trace_preemptirq_template+0x259/0x430 [ 1217.772325] __x64_sys_openat+0x142/0x200 [ 1217.772347] ? __pfx___x64_sys_openat+0x10/0x10 [ 1217.772390] do_syscall_64+0xbf/0x390 [ 1217.772422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1217.772444] RIP: 0033:0x7fc66387fa04 [ 1217.772463] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1217.772485] RSP: 002b:00007fc660e20cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1217.772508] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1217.772524] RDX: 0000000000000000 RSI: 00007fc660e20d60 RDI: 00000000ffffff9c [ 1217.772539] RBP: 00007fc660e20d60 R08: 0000000000000000 R09: 0000000000000000 [ 1217.772553] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1217.772567] R13: 00007ffc55d6fd3f R14: 00007fc660e21300 R15: 0000000000022000 [ 1217.772611] [ 1217.910911] FAULT_INJECTION: forcing a failure. [ 1217.910911] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.911959] CPU: 1 UID: 0 PID: 9279 Comm: syz-executor.3 Tainted: G W 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1217.911979] Tainted: [W]=WARN [ 1217.911983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1217.911990] Call Trace: [ 1217.911995] [ 1217.911999] dump_stack_lvl+0xfa/0x120 [ 1217.912020] should_fail_ex+0x4d7/0x5e0 [ 1217.912037] ? alloc_empty_file+0x58/0x1e0 [ 1217.912056] should_failslab+0xc2/0x120 [ 1217.912073] kmem_cache_alloc_noprof+0x80/0x690 [ 1217.912093] ? __is_insn_slot_addr+0x140/0x290 [ 1217.912113] ? alloc_empty_file+0x58/0x1e0 [ 1217.912130] alloc_empty_file+0x58/0x1e0 [ 1217.912149] path_openat+0xe0/0x2880 [ 1217.912165] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.912184] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.912207] ? __pfx_path_openat+0x10/0x10 19:43:02 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:02 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 20) 19:43:02 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:02 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169", 0xe}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1217.912221] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.912244] do_filp_open+0x1e8/0x450 [ 1217.912258] ? __pfx_do_filp_open+0x10/0x10 [ 1217.912281] ? find_held_lock+0x2b/0x80 [ 1217.912294] ? alloc_fd+0x2c1/0x560 [ 1217.912307] ? lock_release+0xc8/0x290 [ 1217.912326] ? _raw_spin_unlock+0x1e/0x40 [ 1217.912345] ? alloc_fd+0x2c1/0x560 [ 1217.912365] do_sys_openat2+0x104/0x1b0 [ 1217.912384] ? __pfx_do_sys_openat2+0x10/0x10 [ 1217.912412] __x64_sys_openat+0x142/0x200 [ 1217.912423] ? __pfx___x64_sys_openat+0x10/0x10 [ 1217.912437] ? fput+0x6a/0x100 [ 1217.912458] do_syscall_64+0xbf/0x390 [ 1217.912475] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1217.912488] RIP: 0033:0x7f9df1fc0a04 [ 1217.912497] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1217.912515] RSP: 002b:00007f9def582ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1217.912526] RAX: ffffffffffffffda RBX: 00007f9df2057970 RCX: 00007f9df1fc0a04 [ 1217.912535] RDX: 0000000000000002 RSI: 00007f9def583000 RDI: 00000000ffffff9c [ 1217.912542] RBP: 00007f9def583000 R08: 0000000000000000 R09: ffffffffffffffff [ 1217.912550] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1217.912557] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1217.912577] 19:43:02 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 21) 19:43:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 19:43:02 executing program 6: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:02 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1217.995229] FAULT_INJECTION: forcing a failure. [ 1217.995229] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1217.996225] CPU: 1 UID: 0 PID: 9287 Comm: syz-executor.0 Tainted: G W 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1217.996246] Tainted: [W]=WARN [ 1217.996250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1217.996259] Call Trace: [ 1217.996264] [ 1217.996269] dump_stack_lvl+0xfa/0x120 [ 1217.996290] should_fail_ex+0x4d7/0x5e0 [ 1217.996309] should_fail_alloc_page+0xe0/0x110 [ 1217.996330] prepare_alloc_pages+0x1eb/0x550 [ 1217.996351] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1217.996375] ? stack_trace_save+0x8e/0xc0 [ 1217.996397] ? stack_depot_save_flags+0x2c/0xa20 [ 1217.996420] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1217.996442] ? kasan_save_stack+0x24/0x50 [ 1217.996459] ? kasan_save_track+0x14/0x30 [ 1217.996475] ? __kasan_kmalloc+0x7f/0x90 [ 1217.996496] ? do_filp_open+0x1e8/0x450 [ 1217.996515] ? do_sys_openat2+0x104/0x1b0 [ 1217.996535] ? __x64_sys_openat+0x142/0x200 [ 1217.996546] ? do_syscall_64+0xbf/0x390 [ 1217.996562] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1217.996577] ? __pfx_perf_trace_lock+0x10/0x10 [ 1217.996598] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1217.996616] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1217.996639] ? policy_nodemask+0xeb/0x4e0 [ 1217.996662] alloc_pages_mpol+0xed/0x340 [ 1217.996683] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1217.996705] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1217.996725] ? __create_object+0x59/0x80 [ 1217.996749] alloc_pages_noprof+0x9d/0x180 [ 1217.996771] get_zeroed_page_noprof+0x18/0xb0 [ 1217.996785] mon_alloc_buff+0xed/0x250 [ 1217.996811] mon_bin_open+0x209/0x4a0 [ 1217.996831] ? __pfx_mon_bin_open+0x10/0x10 [ 1217.996850] chrdev_open+0x234/0x690 [ 1217.996868] ? __pfx_chrdev_open+0x10/0x10 [ 1217.996885] ? lock_release+0xc8/0x290 [ 1217.996908] do_dentry_open+0x71c/0x1420 [ 1217.996926] ? __pfx_chrdev_open+0x10/0x10 [ 1217.996943] ? inode_permission+0x134/0x610 [ 1217.996965] vfs_open+0x82/0x3f0 [ 1217.996983] ? may_open+0x1f3/0x420 [ 1217.996998] path_openat+0x1c3f/0x2880 [ 1217.997022] ? __pfx_path_openat+0x10/0x10 [ 1217.997038] ? perf_trace_lock_acquire+0xc9/0x700 [ 1217.997062] do_filp_open+0x1e8/0x450 [ 1217.997077] ? __pfx_do_filp_open+0x10/0x10 [ 1217.997102] ? find_held_lock+0x2b/0x80 [ 1217.997115] ? alloc_fd+0x2c1/0x560 [ 1217.997130] ? lock_release+0xc8/0x290 [ 1217.997151] ? alloc_fd+0x2c1/0x560 [ 1217.997173] do_sys_openat2+0x104/0x1b0 [ 1217.997192] ? __pfx_do_sys_openat2+0x10/0x10 [ 1217.997215] ? __fget_files+0x20d/0x3b0 [ 1217.997235] __x64_sys_openat+0x142/0x200 [ 1217.997247] ? __pfx___x64_sys_openat+0x10/0x10 [ 1217.997258] ? ksys_write+0x1a3/0x240 [ 1217.997283] do_syscall_64+0xbf/0x390 [ 1217.997299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1217.997312] RIP: 0033:0x7fc66387fa04 [ 1217.997322] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1217.997335] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1217.997348] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1217.997357] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1217.997365] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1217.997373] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1217.997381] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1217.997402] 19:43:02 executing program 6: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:02 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:02 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1218.081617] loop2: detected capacity change from 0 to 512 [ 1218.110006] EXT4-fs (loop2): failed to parse options in superblock: 19:43:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f00000002c0)="ffff0000010300000097f3a9cb44d42775d831e61b395b95b5c5ca96ccae34707a2b623f53b7a44dcb34353c2cb0550ca6aca9df92c051b68c91f37f4ae0fa54ddf1b26cb988e9022ec1160dc0980deffb864cd69ec3e3439653079ac51bbebb7267ebdcf84dcb67ebe71a95efd56c1748413d3814f5e310d2789f9101be9ca06d64b8d8be90bcf3c56b4761393d53975eaa0ac1efc7f781617e7e9e69dad27ed0", 0xa1, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 1) 19:43:02 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) 19:43:02 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169", 0xe}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) [ 1218.123581] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1218.124312] EXT4-fs (loop2): group descriptors corrupted! 19:43:02 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000c00), 0x0, 0x0) (fail_nth: 22) [ 1218.196110] FAULT_INJECTION: forcing a failure. [ 1218.196110] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.197081] CPU: 1 UID: 0 PID: 9302 Comm: syz-executor.6 Tainted: G W 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1218.197101] Tainted: [W]=WARN [ 1218.197106] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1218.197113] Call Trace: [ 1218.197118] [ 1218.197123] dump_stack_lvl+0xfa/0x120 [ 1218.197144] should_fail_ex+0x4d7/0x5e0 [ 1218.197162] should_failslab+0xc2/0x120 [ 1218.197180] __kmalloc_cache_noprof+0x81/0x6b0 [ 1218.197204] ? task_active_pid_ns+0xa9/0xd0 [ 1218.197221] ? alloc_name+0x41/0x110 [ 1218.197238] ? alloc_name+0x41/0x110 [ 1218.197249] alloc_name+0x41/0x110 [ 1218.197262] __x64_sys_memfd_create+0x130/0x280 [ 1218.197276] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1218.197297] do_syscall_64+0xbf/0x390 [ 1218.197314] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1218.197327] RIP: 0033:0x7f9722357b19 [ 1218.197337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1218.197349] RSP: 002b:00007f971f8ccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1218.197361] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9722357b19 [ 1218.197370] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f97223b10fb [ 1218.197377] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 1218.197385] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 1218.197392] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1218.197412] [ 1218.219076] FAULT_INJECTION: forcing a failure. [ 1218.219076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1218.220281] CPU: 1 UID: 0 PID: 9305 Comm: syz-executor.0 Tainted: G W 6.18.0-rc2-next-20251024 #1 PREEMPT(voluntary) [ 1218.220300] Tainted: [W]=WARN [ 1218.220304] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1218.220310] Call Trace: [ 1218.220315] [ 1218.220319] dump_stack_lvl+0xfa/0x120 [ 1218.220336] should_fail_ex+0x4d7/0x5e0 [ 1218.220353] should_fail_alloc_page+0xe0/0x110 [ 1218.220371] prepare_alloc_pages+0x1eb/0x550 [ 1218.220392] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1218.220414] ? stack_trace_save+0x8e/0xc0 [ 1218.220435] ? stack_depot_save_flags+0x2c/0xa20 [ 1218.220457] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1218.220477] ? kasan_save_stack+0x24/0x50 [ 1218.220493] ? kasan_save_track+0x14/0x30 [ 1218.220512] ? __kasan_kmalloc+0x7f/0x90 [ 1218.220529] ? do_filp_open+0x1e8/0x450 [ 1218.220544] ? do_sys_openat2+0x104/0x1b0 [ 1218.220562] ? __x64_sys_openat+0x142/0x200 [ 1218.220573] ? do_syscall_64+0xbf/0x390 [ 1218.220586] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1218.220598] ? __pfx_perf_trace_lock+0x10/0x10 [ 1218.220618] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1218.220636] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1218.220657] ? policy_nodemask+0xeb/0x4e0 [ 1218.220679] alloc_pages_mpol+0xed/0x340 [ 1218.220698] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1218.220718] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1218.220738] ? __create_object+0x59/0x80 [ 1218.220760] alloc_pages_noprof+0x9d/0x180 [ 1218.220781] get_zeroed_page_noprof+0x18/0xb0 [ 1218.220794] mon_alloc_buff+0xed/0x250 [ 1218.220818] mon_bin_open+0x209/0x4a0 [ 1218.220837] ? __pfx_mon_bin_open+0x10/0x10 [ 1218.220855] chrdev_open+0x234/0x690 [ 1218.220872] ? __pfx_chrdev_open+0x10/0x10 [ 1218.220888] ? lock_release+0xc8/0x290 [ 1218.220910] do_dentry_open+0x71c/0x1420 [ 1218.220927] ? __pfx_chrdev_open+0x10/0x10 [ 1218.220943] ? inode_permission+0x134/0x610 [ 1218.220963] vfs_open+0x82/0x3f0 [ 1218.220980] ? may_open+0x1f3/0x420 [ 1218.220994] path_openat+0x1c3f/0x2880 [ 1218.221018] ? __pfx_path_openat+0x10/0x10 [ 1218.221032] ? perf_trace_lock_acquire+0xc9/0x700 [ 1218.221055] do_filp_open+0x1e8/0x450 [ 1218.221070] ? __pfx_do_filp_open+0x10/0x10 [ 1218.221093] ? find_held_lock+0x2b/0x80 [ 1218.221106] ? alloc_fd+0x2c1/0x560 [ 1218.221119] ? lock_release+0xc8/0x290 [ 1218.221140] ? alloc_fd+0x2c1/0x560 [ 1218.221160] do_sys_openat2+0x104/0x1b0 [ 1218.221179] ? __pfx_do_sys_openat2+0x10/0x10 [ 1218.221200] ? __fget_files+0x20d/0x3b0 [ 1218.221220] __x64_sys_openat+0x142/0x200 [ 1218.221231] ? __pfx___x64_sys_openat+0x10/0x10 [ 1218.221242] ? ksys_write+0x1a3/0x240 [ 1218.221265] do_syscall_64+0xbf/0x390 [ 1218.221280] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1218.221292] RIP: 0033:0x7fc66387fa04 [ 1218.221301] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1218.221314] RSP: 002b:00007fc660e41cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1218.221326] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fc66387fa04 [ 1218.221334] RDX: 0000000000000000 RSI: 00007fc660e41d60 RDI: 00000000ffffff9c [ 1218.221341] RBP: 00007fc660e41d60 R08: 0000000000000000 R09: 0000000000000000 [ 1218.221349] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1218.221356] R13: 00007ffc55d6fd3f R14: 00007fc660e42300 R15: 0000000000022000 [ 1218.221376] VM DIAGNOSIS: 19:43:02 Registers: info registers vcpu 0 RAX=000000000002dc90 RBX=ffff88806cf3c6c0 RCX=ffffc900007e9000 RDX=0000000000040000 RSI=ffffffff8168a4c6 RDI=0000000000000005 RBP=0000000000000003 RSP=ffff88804af3f8a8 R8 =0000000000000001 R9 =0000000000000001 R10=0000000000000001 R11=1ffff1100d9c6bb1 R12=ffffed100d9e78d9 R13=ffff88806cf3c6c8 R14=0000000000000001 R15=dffffc0000000000 RIP=ffffffff8168a4c8 RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fc660e42700 00000000 00000000 GS =0000 ffff8880e53f4000 00000000 00000000 LDT=0000 fffffe6d00000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc6639e0018 CR3=000000001ef7c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ff00000000ff000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000005d RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff82904a85 RDI=ffffffff8890d660 RBP=ffffffff8890d620 RSP=ffff88806cf089a0 R8 =0000000000000000 R9 =ffffed1001666046 R10=000000000000005d R11=0000000000000001 R12=000000000000005d R13=0000000000000010 R14=ffffffff8890d620 R15=ffffffff82904a70 RIP=ffffffff82904add RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fddc20ae8c0 00000000 00000000 GS =0000 ffff8880e54f4000 00000000 00000000 LDT=0000 fffffe4f00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9def582f78 CR3=000000000b7d9000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=34706f6f6c2f6b636f6c622f6c617574 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=0000564f063399f00000564f06341830 XMM06=0000564f063418100000000400000002 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000