'\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) [ 349.939284] loop2: detected capacity change from 0 to 512 11:30:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/softlockup_count', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 349.957753] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 11:30:51 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 349.967801] EXT4-fs (loop6): get root inode failed [ 349.968766] EXT4-fs (loop6): mount failed [ 350.005433] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 350.016744] EXT4-fs (loop2): get root inode failed [ 350.017207] EXT4-fs (loop2): mount failed 11:30:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 358.473644] loop2: detected capacity change from 0 to 512 11:30:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:30:59 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:30:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/softlockup_count', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:30:59 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:30:59 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r1, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) read(r1, &(0x7f0000000180)=""/230, 0xe6) syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000000)=ANY=[], 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 11:30:59 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 358.474161] loop0: detected capacity change from 0 to 512 [ 358.484405] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 358.485848] EXT4-fs (loop2): get root inode failed [ 358.486254] EXT4-fs (loop2): mount failed [ 358.488462] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: bad i_size value: -6820241459971618816 [ 358.497557] EXT4-fs (loop0): get root inode failed [ 358.498686] EXT4-fs (loop0): mount failed 11:30:59 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x3, 0x8}, 0x46e08, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f0000005900)={0xb55, 0x6, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fec000/0x12000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0)="7e31fcf36aaa6364644bff8b02abc3a198ebb064fb9731d1492a29ad6114d63dc1c26a5f2b02502b76bc728ef79db5294482bbe9cd064214dc7811a06bb58deb55", 0x41, r2}, 0x68) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000500), 0x0, {0x31}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x42) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) [ 358.573771] loop6: detected capacity change from 0 to 512 [ 358.584797] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 358.599806] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 358.609531] EXT4-fs (loop6): get root inode failed [ 358.609990] EXT4-fs (loop6): mount failed 11:30:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:30:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:30:59 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 358.714663] loop2: detected capacity change from 0 to 512 [ 358.722985] loop0: detected capacity change from 0 to 512 11:30:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/softlockup_count', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 358.760893] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 11:30:59 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 358.782673] EXT4-fs (loop2): get root inode failed [ 358.783115] EXT4-fs (loop2): mount failed 11:30:59 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x401, 0x2, 0xff, 0x4, 0x4, 0x8000}, 0x20) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) r2 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0) r3 = dup2(r0, r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r3, 0x0) 11:30:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:30:59 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 358.849315] loop0: detected capacity change from 0 to 512 [ 358.857205] loop6: detected capacity change from 0 to 512 11:30:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:30:59 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 358.896685] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 358.906344] EXT4-fs (loop6): get root inode failed [ 358.906790] EXT4-fs (loop6): mount failed 11:31:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:31:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 358.942983] loop2: detected capacity change from 0 to 512 [ 358.971344] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 358.974075] EXT4-fs (loop2): get root inode failed [ 358.975161] EXT4-fs (loop2): mount failed 11:31:00 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 359.021760] loop0: detected capacity change from 0 to 512 [ 359.042139] loop6: detected capacity change from 0 to 512 [ 359.061312] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 359.064809] EXT4-fs (loop6): get root inode failed [ 359.065243] EXT4-fs (loop6): mount failed 11:31:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:09 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000340)={'TPROXY\x00'}, &(0x7f0000000380)=0x1e) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0xfff, &(0x7f0000000040)) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x80, 0x0, 0x5}) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x8b) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x8, 0x7, 0x0, 0x0, 0xa3, 0x27888, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x101, 0x0, @perf_config_ext={0x10000, 0x7}, 0xa401, 0x4, 0x0, 0x6, 0x101, 0x9, 0x8}, 0x0, 0xd, r0, 0x3) pidfd_getfd(r1, r0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002200), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) close(0xffffffffffffffff) clone3(&(0x7f00000015c0)={0x4100, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x14}, &(0x7f0000000280)=""/41, 0x29, &(0x7f0000000400)=""/4096, &(0x7f00000002c0)=[0x0, 0x0], 0x2}, 0x58) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000001640)=ANY=[@ANYBLOB="0100000001000000180000004ae25d64f35be56587157f06834bf1e273e946cc0ed3fcef404929ae2800e9cdd2968df9f69e0d620708b434b174eb3f81dc85429018b9bf8c36f160c4c0f2ced7139ceda3d6864634eef572b10374352ae346cb965f4633725735459228e359410b7df27a31d1c51975b167f9bc82c29e067d1bca0091f4d5c29eec4fbcd5e06a6d50e4f4a303370c5c05a804fcc1071a5eecc2626a83f92829dcdbef3d893d3938ca2a18a1bf644843f05ebb9a143410d39a97d03bbd34fa94fb0a4d5b8e8af2", @ANYBLOB="b851a35a0e0000481756afda69433b8e662fb871f8622cd8d91f351f6a", @ANYBLOB]) perf_event_open(&(0x7f0000001500)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x8c, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x488d, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0xfffffc00}, 0x0, 0x0, r0, 0x0) 11:31:09 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:31:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:09 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r1, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) read(r1, &(0x7f0000000180)=""/230, 0xe6) syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000000)=ANY=[], 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 368.662864] loop2: detected capacity change from 0 to 512 [ 368.685866] loop6: detected capacity change from 0 to 512 [ 368.726381] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 368.727134] loop0: detected capacity change from 0 to 512 [ 368.734763] EXT4-fs (loop2): get root inode failed [ 368.735610] EXT4-fs (loop2): mount failed 11:31:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 368.870905] loop6: detected capacity change from 0 to 512 [ 368.887742] Process accounting resumed 11:31:21 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r1, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) read(r1, &(0x7f0000000180)=""/230, 0xe6) syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000000)=ANY=[], 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 11:31:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:21 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x26, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f00000005c0)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2802}, {&(0x7f0000011000)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x3000}, {&(0x7f0000011100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x3800}, {&(0x7f0000011200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x4000}, {&(0x7f0000011300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x4800}, {&(0x7f0000011400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5000}, {&(0x7f0000011500)="000000000008000000000000000600"/32, 0x20, 0x5800}, {&(0x7f0000011600)="504d4d00504d4dffdef4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7032390075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x6800}, {&(0x7f0000011800)="0200"/32, 0x20, 0x6c00}, {&(0x7f0000011900)="0300"/32, 0x20, 0x7000}, {&(0x7f0000011a00)="0400"/32, 0x20, 0x7400}, {&(0x7f0000011b00)="0500"/32, 0x20, 0x7800}, {&(0x7f0000011c00)="00000000000000000100000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000009800"/96, 0x60, 0x7c00}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x8000}, {&(0x7f0000011e00)="0200"/32, 0x20, 0x8400}, {&(0x7f0000011f00)="0300"/32, 0x20, 0x8800}, {&(0x7f0000012000)="0400"/32, 0x20, 0x8c00}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0500"/2080, 0x820, 0x9000}, {&(0x7f0000012a00)="00000000000000000100000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000009800"/96, 0x60, 0x9c00}, {&(0x7f0000012b00)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d807050766696c653100"/64, 0x40, 0x10000}, {&(0x7f0000012c00)="000002ea0100000001000000270f240c000000000000000000000000000000000601f8070000000006000000779b539778617474723100000601f00700000000060000007498539778617474723200"/96, 0x60, 0x10800}, {&(0x7f0000012d00)="00000000000000000000000000000000786174747232000078617474723100000000000000000000def4655fdef4655fdef4655f00"/64, 0x40, 0x10fe0}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003000000", 0x40, 0x11080}, {&(0x7f0000012f00)="8081000000180000def4655fdef4655fdef4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d000000", 0x40, 0x11100}, {&(0x7f0000013000)="8081000000180000def4655fdef4655fdef4655f00000000000001000c00000010000800000000000af30200040000000000000000000000020000001000000002000000010000001300"/96, 0x60, 0x11180}, {&(0x7f0000013100)="c041000000400000def4655fdef4655fdef4655f00000000000002002000000000000800000000000af301000400000000000000000000000800000004000000", 0x40, 0x11500}, {&(0x7f0000013200)="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"/768, 0x300, 0x11580}, {&(0x7f0000013500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x12000}, {&(0x7f0000013a00)='syzkallers\x00'/32, 0x20, 0x12800}, {&(0x7f0000013b00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x15800}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00693a128a7f1d3e42dbab11c3a881f381fc83084cd1eac1be049485ce0e8872c449882ef3e1ec86c9d84723220734613b1984a882868f18509301573719d0fd049aae"]) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x100, 0x10) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)={'U-', 0x8}, 0x16, 0x1) 11:31:21 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 380.045467] loop6: detected capacity change from 0 to 512 [ 380.058625] loop2: detected capacity change from 0 to 512 11:31:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:21 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 380.316058] loop6: detected capacity change from 0 to 512 11:31:31 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:31 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r1, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) read(r1, &(0x7f0000000180)=""/230, 0xe6) syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000000)=ANY=[], 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 11:31:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:31 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:31:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 390.035916] loop2: detected capacity change from 0 to 512 [ 390.070184] loop6: detected capacity change from 0 to 512 11:31:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) [ 390.135017] EXT4-fs (sda): Online defrag not supported for non-extent files 11:31:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 390.151297] loop2: detected capacity change from 0 to 512 11:31:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:31 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 390.260723] EXT4-fs (sda): Online defrag not supported for non-extent files 11:31:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 390.306918] loop6: detected capacity change from 0 to 512 [ 390.339783] loop2: detected capacity change from 0 to 512 11:31:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:31:41 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:41 executing program 3: syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r0, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) read(r0, &(0x7f0000000180)=""/230, 0xe6) syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000000)=ANY=[], 0x0) 11:31:41 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:41 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:41 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 400.112557] loop2: detected capacity change from 0 to 512 [ 400.151579] loop6: detected capacity change from 0 to 272 11:31:41 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 400.157724] EXT4-fs (sda): Online defrag not supported for non-extent files [ 400.179509] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (68 blocks) [ 400.200828] Process accounting paused [ 400.206018] loop2: detected capacity change from 0 to 272 11:31:41 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:41 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 400.225339] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (68 blocks) 11:31:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) [ 400.290594] No source specified [ 400.323631] EXT4-fs (sda): Online defrag not supported for non-extent files 11:31:52 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:52 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:52 executing program 3: syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r0, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) read(r0, &(0x7f0000000180)=""/230, 0xe6) syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000000)=ANY=[], 0x0) 11:31:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:31:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:52 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:52 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 411.473082] loop2: detected capacity change from 0 to 272 [ 411.491071] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (68 blocks) [ 411.503355] loop6: detected capacity change from 0 to 272 [ 411.522154] No source specified [ 411.525755] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (68 blocks) [ 411.563858] EXT4-fs (sda): Online defrag not supported for non-extent files 11:31:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:52 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:52 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:31:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:31:52 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:31:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 411.745199] loop2: detected capacity change from 0 to 272 [ 411.766326] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (68 blocks) 11:31:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 411.797838] No source specified [ 411.812466] loop6: detected capacity change from 0 to 272 [ 411.844531] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (68 blocks) 11:31:52 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x400000, &(0x7f0000013c00)=ANY=[]) [ 411.958377] EXT4-fs (sda): Online defrag not supported for non-extent files [ 411.973038] No source specified 11:32:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:32:05 executing program 3: syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r0, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) read(r0, &(0x7f0000000180)=""/230, 0xe6) syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000000)=ANY=[], 0x0) 11:32:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:05 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)) 11:32:05 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:05 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 424.603292] No source specified 11:32:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) [ 424.620581] No source specified 11:32:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 424.694227] EXT4-fs (sda): Online defrag not supported for non-extent files 11:32:05 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:05 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:05 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)) 11:32:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) [ 424.779765] EXT4-fs (sda): Online defrag not supported for non-extent files 11:32:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) [ 424.863719] No source specified [ 424.961888] No source specified [ 425.043560] EXT4-fs (sda): Online defrag not supported for non-extent files 11:32:17 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)) 11:32:17 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:17 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r1, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:32:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:32:17 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 436.500804] No source specified 11:32:17 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 436.556856] loop2: detected capacity change from 0 to 512 [ 436.570703] loop6: detected capacity change from 0 to 512 [ 436.580426] EXT4-fs (sda): Online defrag not supported for non-extent files [ 436.595074] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 436.597961] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 436.598635] EXT4-fs (loop6): get root inode failed [ 436.600956] EXT4-fs (loop6): mount failed [ 436.609073] EXT4-fs (loop2): get root inode failed [ 436.610058] EXT4-fs (loop2): mount failed 11:32:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:32:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 436.627111] EXT4-fs (sda): Online defrag not supported for non-extent files [ 436.658616] Process accounting resumed 11:32:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:17 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:17 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:17 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 436.763902] EXT4-fs (sda): Online defrag not supported for non-extent files 11:32:17 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:32:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 436.886322] EXT4-fs (sda): Online defrag not supported for non-extent files [ 436.892325] loop6: detected capacity change from 0 to 512 [ 436.911725] loop2: detected capacity change from 0 to 512 [ 436.937706] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 436.949168] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 436.960760] EXT4-fs (loop2): get root inode failed [ 436.961186] EXT4-fs (loop2): mount failed [ 436.967337] EXT4-fs (loop6): get root inode failed [ 436.968041] EXT4-fs (loop6): mount failed 11:32:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)) 11:32:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:25 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:32:25 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 444.796353] loop6: detected capacity change from 0 to 512 [ 444.822464] EXT4-fs (sda): Online defrag not supported for non-extent files [ 444.826204] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 444.831042] EXT4-fs (loop6): get root inode failed [ 444.831709] EXT4-fs (loop6): mount failed [ 444.841307] loop2: detected capacity change from 0 to 512 11:32:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 444.910289] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 444.915283] EXT4-fs (loop2): get root inode failed [ 444.915785] EXT4-fs (loop2): mount failed 11:32:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:26 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) read(0xffffffffffffffff, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:32:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)) [ 445.028368] EXT4-fs (sda): Online defrag not supported for non-extent files 11:32:37 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) read(0xffffffffffffffff, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:32:37 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:37 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)) 11:32:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:37 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 456.185332] loop2: detected capacity change from 0 to 512 [ 456.187340] loop6: detected capacity change from 0 to 512 [ 456.224265] EXT4-fs (sda): Online defrag not supported for non-extent files [ 456.234535] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 456.246409] EXT4-fs (loop2): get root inode failed [ 456.247662] EXT4-fs (loop2): mount failed [ 456.267798] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated 11:32:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 456.283835] EXT4-fs (loop6): get root inode failed [ 456.284909] EXT4-fs (loop6): mount failed 11:32:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:37 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) read(0xffffffffffffffff, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) [ 456.320834] EXT4-fs (sda): Online defrag not supported for non-extent files 11:32:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:32:37 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:37 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) read(r0, &(0x7f0000000180)=""/230, 0xe6) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:37 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:37 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 456.564117] loop2: detected capacity change from 0 to 512 [ 456.569030] EXT4-fs (sda): Online defrag not supported for non-extent files [ 456.591599] loop6: detected capacity change from 0 to 512 [ 456.593734] EXT4-fs (sda): Online defrag not supported for non-extent files [ 456.603714] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 456.620264] EXT4-fs (loop2): get root inode failed [ 456.621201] EXT4-fs (loop2): mount failed [ 456.655319] EXT4-fs (sda): Online defrag not supported for non-extent files [ 456.665755] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 456.675028] EXT4-fs (loop6): get root inode failed [ 456.675847] EXT4-fs (loop6): mount failed 11:32:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c627", 0xd3, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) read(r0, &(0x7f0000000180)=""/230, 0xe6) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:46 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:46 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:32:46 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 465.580636] loop6: detected capacity change from 0 to 512 [ 465.594174] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 465.599833] EXT4-fs (loop6): get root inode failed [ 465.600285] EXT4-fs (loop6): mount failed 11:32:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c627", 0xd3, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 465.641760] loop2: detected capacity change from 0 to 512 [ 465.649614] EXT4-fs (sda): Online defrag not supported for non-extent files [ 465.677133] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated 11:32:46 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 465.683084] EXT4-fs (loop2): get root inode failed [ 465.683534] EXT4-fs (loop2): mount failed 11:32:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c627", 0xd3, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 465.700085] EXT4-fs (sda): Online defrag not supported for non-extent files 11:32:46 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 465.745829] EXT4-fs (sda): Online defrag not supported for non-extent files [ 465.766594] loop6: detected capacity change from 0 to 512 [ 465.775049] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 465.776855] EXT4-fs (loop6): get root inode failed [ 465.777284] EXT4-fs (loop6): mount failed [ 465.849270] loop2: detected capacity change from 0 to 512 [ 465.856174] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 465.857383] EXT4-fs (loop2): get root inode failed [ 465.857831] EXT4-fs (loop2): mount failed 11:32:56 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) read(r0, &(0x7f0000000180)=""/230, 0xe6) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:56 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:32:56 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:56 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x13d, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 475.200071] loop6: detected capacity change from 0 to 512 [ 475.212332] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 475.214948] EXT4-fs (loop6): get root inode failed [ 475.215415] EXT4-fs (loop6): mount failed [ 475.216782] loop2: detected capacity change from 0 to 512 [ 475.242636] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 475.251807] EXT4-fs (loop2): get root inode failed [ 475.252293] EXT4-fs (loop2): mount failed [ 475.271353] Process accounting paused 11:32:56 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb38", 0x13d, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:32:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:56 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c627", 0xd3, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 475.308009] EXT4-fs (sda): Online defrag not supported for non-extent files 11:32:56 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 475.322202] EXT4-fs (sda): Online defrag not supported for non-extent files 11:32:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:32:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:32:56 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1}) [ 475.419095] loop2: detected capacity change from 0 to 512 [ 475.429731] loop6: detected capacity change from 0 to 512 11:32:56 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x13d, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 475.472870] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 475.478753] EXT4-fs (loop6): get root inode failed [ 475.479864] EXT4-fs (loop6): mount failed [ 475.483536] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 475.494081] EXT4-fs (loop2): get root inode failed [ 475.494597] EXT4-fs (loop2): mount failed [ 475.508076] EXT4-fs (sda): Online defrag not supported for non-extent files [ 475.553003] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:06 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1}) 11:33:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c627", 0xd3, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:06 executing program 3: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:33:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:33:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x172, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 485.062243] loop2: detected capacity change from 0 to 512 [ 485.098013] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 485.099134] EXT4-fs (sda): Online defrag not supported for non-extent files [ 485.103047] EXT4-fs (loop2): get root inode failed [ 485.103671] EXT4-fs (loop2): mount failed [ 485.103737] loop6: detected capacity change from 0 to 512 11:33:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x172, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 485.165570] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated 11:33:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 485.200116] EXT4-fs (loop6): get root inode failed [ 485.200893] EXT4-fs (loop6): mount failed [ 485.203276] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) 11:33:06 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1}) [ 485.318549] loop2: detected capacity change from 0 to 512 11:33:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x172, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 485.354884] EXT4-fs (sda): Online defrag not supported for non-extent files [ 485.359977] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 485.368078] EXT4-fs (loop2): get root inode failed [ 485.368604] EXT4-fs (loop2): mount failed [ 485.418250] loop6: detected capacity change from 0 to 512 11:33:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 485.459266] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 485.460722] EXT4-fs (loop6): get root inode failed [ 485.461142] EXT4-fs (loop6): mount failed [ 485.479692] EXT4-fs (sda): Online defrag not supported for non-extent files [ 485.511757] EXT4-fs (sda): Online defrag not supported for non-extent files [ 485.532747] EXT4-fs (sda): Online defrag not supported for non-extent files [ 485.556627] loop2: detected capacity change from 0 to 512 [ 485.566139] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 485.571820] EXT4-fs (loop2): get root inode failed [ 485.572234] EXT4-fs (loop2): mount failed 11:33:16 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:16 executing program 3: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:33:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:16 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8", 0x18c, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 495.655377] loop2: detected capacity change from 0 to 512 [ 495.677038] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 495.680627] EXT4-fs (loop2): get root inode failed [ 495.681053] EXT4-fs (loop2): mount failed [ 495.685591] loop6: detected capacity change from 0 to 512 [ 495.725999] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 495.734300] EXT4-fs (loop6): get root inode failed [ 495.735307] EXT4-fs (loop6): mount failed [ 495.757711] EXT4-fs (sda): Online defrag not supported for non-extent files [ 495.766674] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x18c, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 495.791405] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b", 0x6a, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:16 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b", 0x6a, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:16 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x18c, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 495.993383] EXT4-fs (sda): Online defrag not supported for non-extent files [ 496.003116] loop2: detected capacity change from 0 to 512 [ 496.018354] loop6: detected capacity change from 0 to 512 [ 496.048059] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 35612 11:33:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 496.067688] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 35612 [ 496.068034] EXT4-fs (loop2): get root inode failed [ 496.070569] EXT4-fs (loop2): mount failed [ 496.071705] EXT4-fs (loop6): get root inode failed [ 496.072704] EXT4-fs (loop6): mount failed [ 496.217377] EXT4-fs (sda): Online defrag not supported for non-extent files [ 496.219854] EXT4-fs (sda): Online defrag not supported for non-extent files [ 496.297002] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036", 0x199, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:27 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b", 0x6a, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:27 executing program 3: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:33:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:27 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b", 0x6a, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 506.834645] loop6: detected capacity change from 0 to 512 [ 506.837317] loop2: detected capacity change from 0 to 512 [ 506.848635] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 35612 [ 506.850382] EXT4-fs (loop6): get root inode failed [ 506.851009] EXT4-fs (loop6): mount failed [ 506.854353] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 35612 [ 506.860131] EXT4-fs (loop2): get root inode failed [ 506.860346] Process accounting resumed [ 506.860751] EXT4-fs (loop2): mount failed 11:33:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x199, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b", 0x6a, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:28 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b", 0x6a, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 506.938757] EXT4-fs (sda): Online defrag not supported for non-extent files [ 506.974400] EXT4-fs (sda): Online defrag not supported for non-extent files [ 506.979797] loop6: detected capacity change from 0 to 512 [ 506.987969] loop2: detected capacity change from 0 to 512 [ 506.999514] EXT4-fs (sda): Online defrag not supported for non-extent files [ 507.007382] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 35612 [ 507.012641] EXT4-fs (loop6): get root inode failed [ 507.013232] EXT4-fs (loop6): mount failed 11:33:28 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r1}) [ 507.021619] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 35612 [ 507.024752] EXT4-fs (loop2): get root inode failed [ 507.025180] EXT4-fs (loop2): mount failed 11:33:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 507.175002] EXT4-fs (sda): Online defrag not supported for non-extent files [ 507.189810] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:37 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9", 0x9f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:37 executing program 3: r0 = syz_io_uring_setup(0xa5, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:33:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x199, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:37 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9", 0x9f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:37 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r1}) 11:33:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) [ 516.749379] loop6: detected capacity change from 0 to 512 [ 516.762581] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 516.765827] EXT4-fs (loop6): get root inode failed [ 516.766265] EXT4-fs (loop6): mount failed 11:33:37 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 516.826772] EXT4-fs (sda): Online defrag not supported for non-extent files [ 516.847871] loop2: detected capacity change from 0 to 512 11:33:37 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r1}) [ 516.884180] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 11:33:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) [ 516.894344] loop6: detected capacity change from 0 to 512 [ 516.895121] EXT4-fs (sda): Online defrag not supported for non-extent files [ 516.897402] EXT4-fs (loop2): get root inode failed [ 516.898284] EXT4-fs (loop2): mount failed 11:33:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d", 0x1a0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 516.935148] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 7637788 [ 516.948264] EXT4-fs (loop6): get root inode failed [ 516.948699] EXT4-fs (loop6): mount failed [ 516.959303] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 517.035781] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 517.058319] loop2: detected capacity change from 0 to 512 [ 517.087557] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 7637788 [ 517.092520] EXT4-fs (loop2): get root inode failed [ 517.092937] EXT4-fs (loop2): mount failed [ 517.102268] EXT4-fs (sda): Online defrag not supported for non-extent files [ 517.104129] loop6: detected capacity change from 0 to 512 [ 517.129484] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 7637788 [ 517.141284] EXT4-fs (loop6): get root inode failed [ 517.141718] EXT4-fs (loop6): mount failed [ 517.175410] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:47 executing program 3: r0 = syz_io_uring_setup(0xa5, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:47 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) [ 526.131315] loop2: detected capacity change from 0 to 512 [ 526.153766] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 7637788 [ 526.157397] EXT4-fs (loop2): get root inode failed [ 526.158183] EXT4-fs (loop2): mount failed 11:33:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 526.184884] loop6: detected capacity change from 0 to 512 [ 526.210101] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 7637788 [ 526.215250] EXT4-fs (loop6): get root inode failed [ 526.216109] EXT4-fs (loop6): mount failed 11:33:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 526.307870] EXT4-fs (sda): Online defrag not supported for non-extent files [ 526.320188] EXT4-fs (sda): Online defrag not supported for non-extent files [ 526.360053] loop2: detected capacity change from 0 to 512 11:33:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:47 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659be", 0x85, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a3, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 526.423661] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 7637788 [ 526.430262] EXT4-fs (loop2): get root inode failed [ 526.430706] EXT4-fs (loop2): mount failed 11:33:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 526.455190] loop6: detected capacity change from 0 to 512 [ 526.546142] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 526.588963] EXT4-fs (loop6): get root inode failed [ 526.590077] EXT4-fs (loop6): mount failed [ 526.680605] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:57 executing program 3: r0 = syz_io_uring_setup(0xa5, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:33:57 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:57 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:57 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659be", 0x85, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:33:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a3, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 536.564728] loop6: detected capacity change from 0 to 512 [ 536.609608] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 7637788 [ 536.614861] EXT4-fs (loop6): get root inode failed [ 536.614917] loop2: detected capacity change from 0 to 512 [ 536.615634] EXT4-fs (loop6): mount failed 11:33:57 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 536.706567] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 536.719688] EXT4-fs (loop2): get root inode failed [ 536.720569] EXT4-fs (loop2): mount failed [ 536.729700] loop6: detected capacity change from 0 to 512 11:33:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a3, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 536.752074] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 7637788 [ 536.758625] EXT4-fs (sda): Online defrag not supported for non-extent files 11:33:57 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 536.761279] EXT4-fs (loop6): get root inode failed [ 536.762288] EXT4-fs (loop6): mount failed 11:33:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @tcp_ip4_spec={@rand_addr, @private, 0x0, 0x1}, @esp_ip4_spec={@multicast1, @local}}}}) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 536.906173] EXT4-fs (sda): Online defrag not supported for non-extent files [ 536.953262] Process accounting paused 11:33:58 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:33:58 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 537.069578] loop6: detected capacity change from 0 to 512 [ 537.090108] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 7637788 [ 537.094537] EXT4-fs (loop6): get root inode failed [ 537.095329] EXT4-fs (loop6): mount failed 11:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:05 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:34:05 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a5, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:05 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3", 0x78, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:05 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:05 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f", 0x1a5, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 544.924251] loop2: detected capacity change from 0 to 512 [ 544.940268] EXT4-fs (sda): Online defrag not supported for non-extent files 11:34:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a5, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 544.959111] loop6: detected capacity change from 0 to 512 [ 544.982631] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 7637788 [ 545.004822] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 545.008880] EXT4-fs (loop2): get root inode failed [ 545.009379] EXT4-fs (loop2): mount failed 11:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 545.014612] EXT4-fs (loop6): get root inode failed [ 545.015020] EXT4-fs (loop6): mount failed 11:34:06 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 545.180223] loop2: detected capacity change from 0 to 512 [ 545.200752] loop6: detected capacity change from 0 to 512 [ 545.213267] EXT4-fs (sda): Online defrag not supported for non-extent files [ 545.221611] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 7637788 [ 545.223646] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 7637788 [ 545.228270] EXT4-fs (loop6): get root inode failed [ 545.229113] EXT4-fs (loop6): mount failed [ 545.230295] EXT4-fs (loop2): get root inode failed [ 545.231373] EXT4-fs (loop2): mount failed 11:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:16 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:34:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:16 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:16 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 555.763848] loop2: detected capacity change from 0 to 512 [ 555.765353] loop6: detected capacity change from 0 to 512 11:34:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 555.811497] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 7637788 [ 555.819821] EXT4-fs (loop2): get root inode failed [ 555.820543] EXT4-fs (loop2): mount failed [ 555.820982] EXT4-fs (sda): Online defrag not supported for non-extent files [ 555.832910] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 7637788 [ 555.849857] EXT4-fs (loop6): get root inode failed [ 555.851032] EXT4-fs (loop6): mount failed 11:34:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:17 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 556.026604] loop6: detected capacity change from 0 to 512 [ 556.077965] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 7637788 [ 556.084050] EXT4-fs (loop6): get root inode failed [ 556.085261] EXT4-fs (loop6): mount failed 11:34:27 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:34:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:27 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3", 0x78, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 566.046109] loop6: detected capacity change from 0 to 512 [ 566.068659] loop2: detected capacity change from 0 to 512 [ 566.084518] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 566.091172] EXT4-fs (loop6): get root inode failed [ 566.091989] EXT4-fs (loop6): mount failed [ 566.127163] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 566.135042] EXT4-fs (loop2): get root inode failed [ 566.135983] EXT4-fs (loop2): mount failed [ 566.146955] EXT4-fs (sda): Online defrag not supported for non-extent files 11:34:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:27 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e1", 0x6c, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 566.267651] EXT4-fs (sda): Online defrag not supported for non-extent files 11:34:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3", 0x78, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:27 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 566.416334] loop6: detected capacity change from 0 to 512 11:34:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 566.456786] loop2: detected capacity change from 0 to 512 [ 566.462407] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 3782511388 [ 566.473163] EXT4-fs (loop6): get root inode failed [ 566.474065] EXT4-fs (loop6): mount failed [ 566.510012] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 566.516666] EXT4-fs (loop2): get root inode failed [ 566.517798] EXT4-fs (loop2): mount failed [ 566.553302] EXT4-fs (sda): Online defrag not supported for non-extent files 11:34:36 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), 0x0) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:34:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:36 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e1", 0x6c, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:36 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:36 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 575.136350] loop2: detected capacity change from 0 to 512 [ 575.139879] loop6: detected capacity change from 0 to 512 [ 575.185069] EXT4-fs (sda): Online defrag not supported for non-extent files [ 575.188496] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 3782511388 [ 575.195579] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 7637788 [ 575.202868] EXT4-fs (loop6): get root inode failed [ 575.203399] EXT4-fs (loop6): mount failed [ 575.204253] EXT4-fs (loop2): get root inode failed [ 575.205142] EXT4-fs (loop2): mount failed [ 575.233273] Process accounting resumed 11:34:36 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:36 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:36 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e1", 0x6c, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 575.452417] loop6: detected capacity change from 0 to 512 [ 575.459048] loop2: detected capacity change from 0 to 512 [ 575.514307] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 7637788 11:34:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 575.543927] EXT4-fs (loop2): get root inode failed [ 575.544895] EXT4-fs (loop2): mount failed [ 575.551940] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad extended attribute block 3782511388 [ 575.574556] EXT4-fs (loop6): get root inode failed [ 575.575355] EXT4-fs (loop6): mount failed [ 575.665739] EXT4-fs (sda): Online defrag not supported for non-extent files 11:34:46 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), 0x0) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:34:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:46 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:46 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 584.949155] loop6: detected capacity change from 0 to 512 [ 584.963999] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: 25229973631535104 11:34:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 584.968369] EXT4-fs (loop6): get root inode failed [ 584.968838] EXT4-fs (loop6): mount failed [ 585.003812] EXT4-fs (sda): Online defrag not supported for non-extent files [ 585.015167] loop2: detected capacity change from 0 to 512 11:34:46 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 585.076544] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 7637788 11:34:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 585.087491] EXT4-fs (loop2): get root inode failed [ 585.087916] EXT4-fs (loop2): mount failed 11:34:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 585.153637] loop6: detected capacity change from 0 to 512 11:34:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 585.179055] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: 25229973631535104 11:34:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:46 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 585.189035] EXT4-fs (loop6): get root inode failed [ 585.189863] EXT4-fs (loop6): mount failed [ 585.255659] EXT4-fs (sda): Online defrag not supported for non-extent files [ 585.326887] loop2: detected capacity change from 0 to 512 [ 585.341561] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 585.342893] EXT4-fs (loop2): get root inode failed [ 585.343308] EXT4-fs (loop2): mount failed 11:34:55 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), 0x0) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:34:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:55 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a", 0x48, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 594.444824] loop2: detected capacity change from 0 to 512 [ 594.463136] EXT4-fs (sda): Online defrag not supported for non-extent files [ 594.474793] loop6: detected capacity change from 0 to 512 [ 594.482901] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 594.498105] EXT4-fs (loop2): get root inode failed [ 594.499228] EXT4-fs (loop2): mount failed 11:34:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 594.527895] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: 25229973631535104 [ 594.538580] EXT4-fs (loop6): get root inode failed [ 594.539394] EXT4-fs (loop6): mount failed 11:34:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a", 0x48, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:34:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:34:55 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d", 0x71, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 594.684810] loop2: detected capacity change from 0 to 512 [ 594.687032] EXT4-fs (sda): Online defrag not supported for non-extent files 11:34:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a", 0x48, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 594.694742] EXT4-fs (sda): Online defrag not supported for non-extent files [ 594.707680] loop6: detected capacity change from 0 to 512 [ 594.742887] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 594.748351] EXT4-fs (loop6): get root inode failed [ 594.748884] EXT4-fs (loop6): mount failed [ 594.752192] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 594.763509] EXT4-fs (loop2): get root inode failed [ 594.764320] EXT4-fs (loop2): mount failed 11:35:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e1", 0x6c, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:06 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x0, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:35:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2", 0x6c, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 605.046330] loop2: detected capacity change from 0 to 512 [ 605.062482] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 3782511388 [ 605.063849] EXT4-fs (loop2): get root inode failed [ 605.064257] EXT4-fs (loop2): mount failed [ 605.108098] loop6: detected capacity change from 0 to 512 [ 605.144533] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 605.147181] EXT4-fs (loop6): get root inode failed [ 605.148086] EXT4-fs (loop6): mount failed 11:35:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e1", 0x6c, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:06 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x0, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:35:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2", 0x6c, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 605.174491] EXT4-fs (sda): Online defrag not supported for non-extent files [ 605.188102] EXT4-fs (sda): Online defrag not supported for non-extent files [ 605.234375] loop2: detected capacity change from 0 to 512 11:35:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 605.276951] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 3782511388 11:35:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 605.294799] EXT4-fs (loop2): get root inode failed [ 605.295408] EXT4-fs (loop2): mount failed 11:35:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:06 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x0, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) [ 605.380844] loop6: detected capacity change from 0 to 512 [ 605.404843] Process accounting paused 11:35:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2", 0x6c, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 605.436318] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: 25229973631535104 [ 605.453220] EXT4-fs (loop6): get root inode failed [ 605.454180] EXT4-fs (loop6): mount failed 11:35:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e1", 0x6c, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 605.558159] EXT4-fs (sda): Online defrag not supported for non-extent files 11:35:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:06 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) socket$packet(0x11, 0x2, 0x300) read(0xffffffffffffffff, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:35:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b934", 0x7e, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 605.649863] loop2: detected capacity change from 0 to 512 [ 605.660412] loop6: detected capacity change from 0 to 512 [ 605.678233] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad extended attribute block 3782511388 [ 605.683838] EXT4-fs (loop2): get root inode failed [ 605.684413] EXT4-fs (loop2): mount failed [ 605.697587] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: 25229973631535104 [ 605.700054] EXT4-fs (loop6): get root inode failed [ 605.700702] EXT4-fs (loop6): mount failed 11:35:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:16 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b934", 0x7e, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:16 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) socket$packet(0x11, 0x2, 0x300) read(0xffffffffffffffff, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:35:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 615.487299] loop6: detected capacity change from 0 to 512 [ 615.508898] loop2: detected capacity change from 0 to 512 [ 615.523831] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: 25229973631535104 [ 615.535078] EXT4-fs (loop6): get root inode failed [ 615.535781] EXT4-fs (loop6): mount failed [ 615.537730] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: 25229973631535104 [ 615.552586] EXT4-fs (loop2): get root inode failed [ 615.552990] EXT4-fs (loop2): mount failed [ 615.575361] EXT4-fs (sda): Online defrag not supported for non-extent files 11:35:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b934", 0x7e, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:26 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) socket$packet(0x11, 0x2, 0x300) read(0xffffffffffffffff, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:35:26 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:26 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739", 0x87, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 625.500400] loop2: detected capacity change from 0 to 512 [ 625.504382] loop6: detected capacity change from 0 to 512 [ 625.534098] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: 25229973631535104 [ 625.538161] EXT4-fs (loop2): get root inode failed [ 625.539003] EXT4-fs (loop2): mount failed 11:35:26 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 625.556902] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 625.564604] EXT4-fs (loop6): get root inode failed [ 625.567145] EXT4-fs (loop6): mount failed 11:35:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 625.655519] EXT4-fs (sda): Online defrag not supported for non-extent files [ 625.696805] EXT4-fs (sda): Online defrag not supported for non-extent files 11:35:26 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739", 0x87, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:26 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 11:35:26 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 625.865482] loop2: detected capacity change from 0 to 512 11:35:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 625.901904] loop6: detected capacity change from 0 to 512 [ 625.915820] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: 25229973631535104 [ 625.929116] EXT4-fs (loop2): get root inode failed [ 625.930195] EXT4-fs (loop2): mount failed 11:35:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739", 0x87, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 626.012144] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 626.021058] EXT4-fs (loop6): get root inode failed [ 626.021850] EXT4-fs (loop6): mount failed 11:35:27 executing program 3: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 11:35:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d", 0x71, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6", 0x8b, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 626.136609] EXT4-fs (sda): Online defrag not supported for non-extent files [ 626.194766] EXT4-fs (sda): Online defrag not supported for non-extent files [ 626.282279] loop2: detected capacity change from 0 to 512 [ 626.317263] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 626.322846] EXT4-fs (loop2): get root inode failed [ 626.323517] EXT4-fs (loop2): mount failed 11:35:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:36 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d", 0x71, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6", 0x8b, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:36 executing program 3: syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r0 = socket$packet(0x11, 0x2, 0x300) read(r0, &(0x7f0000000180)=""/230, 0xe6) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:35:36 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 635.784684] EXT4-fs (sda): Online defrag not supported for non-extent files 11:35:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 635.849364] loop6: detected capacity change from 0 to 512 [ 635.871218] loop2: detected capacity change from 0 to 512 11:35:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 635.880134] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: special inode unallocated [ 635.881807] EXT4-fs (sda): Online defrag not supported for non-extent files [ 635.882572] EXT4-fs (loop6): get root inode failed [ 635.882967] EXT4-fs (loop6): mount failed 11:35:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 635.922852] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 635.927771] EXT4-fs (loop2): get root inode failed [ 635.928177] EXT4-fs (loop2): mount failed [ 635.965180] Process accounting resumed [ 636.007888] EXT4-fs (sda): Online defrag not supported for non-extent files [ 636.104972] EXT4-fs (sda): Online defrag not supported for non-extent files 11:35:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6", 0x8b, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 645.999235] loop6: detected capacity change from 0 to 512 11:35:47 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:47 executing program 3: syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r0 = socket$packet(0x11, 0x2, 0x300) read(r0, &(0x7f0000000180)=""/230, 0xe6) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:35:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d", 0x71, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 646.015671] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 11:35:47 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 646.083655] loop2: detected capacity change from 0 to 512 [ 646.105972] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 646.112361] EXT4-fs (loop2): get root inode failed [ 646.112919] EXT4-fs (loop2): mount failed [ 646.137928] EXT4-fs (sda): Online defrag not supported for non-extent files 11:35:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9", 0x8d, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 646.182996] loop6: detected capacity change from 0 to 512 11:35:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 646.225249] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 11:35:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:47 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 646.339763] EXT4-fs (sda): Online defrag not supported for non-extent files [ 646.386642] loop2: detected capacity change from 0 to 512 [ 646.412878] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 646.416906] EXT4-fs (loop2): get root inode failed [ 646.417837] EXT4-fs (loop2): mount failed [ 646.424635] loop6: detected capacity change from 0 to 512 [ 646.460774] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 11:35:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9", 0x8d, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:57 executing program 3: syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r0 = socket$packet(0x11, 0x2, 0x300) read(r0, &(0x7f0000000180)=""/230, 0xe6) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:35:57 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:57 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 656.641816] EXT4-fs (sda): Online defrag not supported for non-extent files 11:35:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 656.671129] loop2: detected capacity change from 0 to 512 [ 656.671150] loop6: detected capacity change from 0 to 512 11:35:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 656.689960] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 656.703602] EXT4-fs (loop2): get root inode failed [ 656.704013] EXT4-fs (loop2): mount failed [ 656.705808] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 11:35:57 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:57 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9", 0x8d, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:35:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:35:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 656.910300] EXT4-fs (sda): Online defrag not supported for non-extent files [ 656.929993] loop6: detected capacity change from 0 to 512 [ 656.934259] loop2: detected capacity change from 0 to 512 [ 656.948314] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 [ 656.971794] EXT4-fs (sda): Online defrag not supported for non-extent files [ 656.978244] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: special inode unallocated [ 656.990264] EXT4-fs (loop2): get root inode failed [ 656.991249] EXT4-fs (loop2): mount failed 11:36:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:08 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:08 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:08 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d5", 0x8e, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 667.533054] loop6: detected capacity change from 0 to 512 [ 667.550716] loop2: detected capacity change from 0 to 512 [ 667.553502] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 [ 667.598407] EXT4-fs warning (device loop2): read_mmp_block:110: Error -117 while reading MMP block 12 [ 667.635970] EXT4-fs (sda): Online defrag not supported for non-extent files [ 667.647244] EXT4-fs (sda): Online defrag not supported for non-extent files [ 667.648229] Process accounting paused 11:36:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:08 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:08 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d5", 0x8e, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:08 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 667.853338] loop2: detected capacity change from 0 to 512 [ 667.855395] loop6: detected capacity change from 0 to 512 [ 667.886740] EXT4-fs (sda): Online defrag not supported for non-extent files [ 667.888139] EXT4-fs warning (device loop2): read_mmp_block:110: Error -117 while reading MMP block 12 [ 667.895076] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 [ 667.962346] EXT4-fs (sda): Online defrag not supported for non-extent files [ 668.021227] EXT4-fs (sda): Online defrag not supported for non-extent files 11:36:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:17 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:17 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d5", 0x8e, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 676.769890] loop6: detected capacity change from 0 to 512 [ 676.786141] loop2: detected capacity change from 0 to 512 [ 676.822208] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 [ 676.852055] EXT4-fs warning (device loop2): read_mmp_block:110: Error -117 while reading MMP block 12 [ 676.854048] EXT4-fs (sda): Online defrag not supported for non-extent files [ 676.860965] EXT4-fs (sda): Online defrag not supported for non-extent files [ 676.861541] EXT4-fs (sda): Online defrag not supported for non-extent files 11:36:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:18 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:18 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 677.089227] loop2: detected capacity change from 0 to 512 [ 677.103761] EXT4-fs (sda): Online defrag not supported for non-extent files [ 677.118133] EXT4-fs warning (device loop2): read_mmp_block:110: Error -117 while reading MMP block 12 [ 677.130202] loop6: detected capacity change from 0 to 512 [ 677.154739] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 [ 677.214331] EXT4-fs (sda): Online defrag not supported for non-extent files 11:36:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:27 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a", 0x48, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 686.195099] loop2: detected capacity change from 0 to 512 [ 686.205522] EXT4-fs warning (device loop2): read_mmp_block:110: Error -117 while reading MMP block 12 [ 686.227183] loop6: detected capacity change from 0 to 512 11:36:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 686.262703] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 11:36:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 686.273930] EXT4-fs (loop6): get root inode failed [ 686.274357] EXT4-fs (loop6): mount failed [ 686.297529] EXT4-fs (sda): Online defrag not supported for non-extent files [ 686.350647] loop2: detected capacity change from 0 to 512 11:36:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 686.371917] EXT4-fs (sda): Online defrag not supported for non-extent files [ 686.378776] EXT4-fs warning (device loop2): read_mmp_block:110: Error -117 while reading MMP block 12 11:36:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:27 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='P', 0x1, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 11:36:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 686.481975] loop6: detected capacity change from 0 to 512 [ 686.495107] EXT4-fs (sda): Online defrag not supported for non-extent files [ 686.496936] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 [ 686.555070] loop2: detected capacity change from 0 to 512 11:36:27 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='P', 0x1, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 686.569820] EXT4-fs warning (device loop2): read_mmp_block:110: Error -117 while reading MMP block 12 [ 686.613215] EXT4-fs (sda): Online defrag not supported for non-extent files [ 686.652300] loop6: detected capacity change from 0 to 512 [ 686.668095] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 11:36:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='P', 0x1, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 11:36:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 699.271880] loop6: detected capacity change from 0 to 512 [ 699.278344] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 11:36:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce", 0x25, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 699.322643] EXT4-fs (sda): Online defrag not supported for non-extent files [ 699.330221] loop2: detected capacity change from 0 to 512 [ 699.332988] EXT4-fs (sda): Online defrag not supported for non-extent files [ 699.353953] EXT4-fs warning (device loop2): read_mmp_block:110: Error -117 while reading MMP block 12 [ 699.389474] loop6: detected capacity change from 0 to 512 [ 699.395343] Process accounting resumed [ 699.408954] EXT4-fs (sda): Online defrag not supported for non-extent files 11:36:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 699.441636] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 699.446736] EXT4-fs (loop6): get root inode failed [ 699.447123] EXT4-fs (loop6): mount failed 11:36:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 11:36:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:49 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PM', 0x2, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='P', 0x1, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:49 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400), 0x0, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 708.436254] loop6: detected capacity change from 0 to 512 [ 708.444927] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 [ 708.479340] loop2: detected capacity change from 0 to 512 [ 708.511066] EXT4-fs (sda): Online defrag not supported for non-extent files 11:36:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:49 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PM', 0x2, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 708.523587] EXT4-fs (sda): Online defrag not supported for non-extent files [ 708.536476] EXT4-fs warning (device loop2): read_mmp_block:110: Error -117 while reading MMP block 12 11:36:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:49 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a", 0x48, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 708.621540] EXT4-fs (sda): Online defrag not supported for non-extent files 11:36:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 708.637965] loop6: detected capacity change from 0 to 512 11:36:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)) [ 708.669859] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 11:36:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 708.684900] loop2: detected capacity change from 0 to 512 [ 708.705532] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 708.711876] EXT4-fs (loop2): get root inode failed [ 708.713591] EXT4-fs (loop2): mount failed 11:36:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:49 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a", 0x48, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 708.813483] loop2: detected capacity change from 0 to 512 11:36:49 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PM', 0x2, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 708.855527] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 708.862992] EXT4-fs (sda): Online defrag not supported for non-extent files [ 708.869787] EXT4-fs (loop2): get root inode failed [ 708.870831] EXT4-fs (loop2): mount failed [ 708.887215] loop6: detected capacity change from 0 to 512 11:36:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 708.957696] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 11:36:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 709.165914] EXT4-fs (sda): Online defrag not supported for non-extent files 11:36:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)) 11:36:58 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f9", 0x14, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140), 0x0, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:36:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a", 0x48, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 717.091642] loop6: detected capacity change from 0 to 512 [ 717.115107] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 717.119323] EXT4-fs (loop6): get root inode failed [ 717.119761] EXT4-fs (loop6): mount failed 11:36:58 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM', 0x3, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 717.192666] loop2: detected capacity change from 0 to 512 11:36:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 717.249044] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 717.258179] EXT4-fs (loop2): get root inode failed [ 717.258650] EXT4-fs (loop2): mount failed [ 717.272110] loop6: detected capacity change from 0 to 512 [ 717.288616] EXT4-fs (sda): Online defrag not supported for non-extent files 11:36:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PM', 0x2, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:36:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)) 11:36:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2", 0x6c, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 717.437330] loop2: detected capacity change from 0 to 512 [ 717.445153] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 717.446831] EXT4-fs (loop2): get root inode failed [ 717.447242] EXT4-fs (loop2): mount failed [ 718.101468] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 718.101468] 11:37:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2", 0x6c, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)) 11:37:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a", 0x48, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM', 0x3, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 728.593281] loop6: detected capacity change from 0 to 512 [ 728.651582] loop2: detected capacity change from 0 to 512 [ 728.707081] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 728.717922] EXT4-fs (sda): Online defrag not supported for non-extent files [ 728.725643] EXT4-fs (loop2): get root inode failed [ 728.726651] EXT4-fs (loop2): mount failed 11:37:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e", 0x49, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:10 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2", 0x6c, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 728.993266] loop2: detected capacity change from 0 to 512 [ 729.046143] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 729.059639] EXT4-fs (loop2): get root inode failed [ 729.060496] EXT4-fs (loop2): mount failed 11:37:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 729.092268] EXT4-fs (sda): Online defrag not supported for non-extent files 11:37:10 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:10 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 729.417737] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 729.417737] [ 729.431261] EXT4-fs (sda): Online defrag not supported for non-extent files 11:37:19 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:19 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM', 0x3, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 11:37:19 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e", 0x49, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259", 0x6f, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 738.883516] loop2: detected capacity change from 0 to 512 [ 738.927994] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 738.940958] EXT4-fs (loop2): get root inode failed [ 738.941778] EXT4-fs (loop2): mount failed [ 738.954225] loop6: detected capacity change from 0 to 512 [ 738.989452] Process accounting paused 11:37:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e", 0x49, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e1", 0x6c, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3", 0x78, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 739.221105] loop2: detected capacity change from 0 to 512 [ 739.249862] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 739.265562] EXT4-fs (loop2): get root inode failed [ 739.266725] EXT4-fs (loop2): mount failed [ 739.754835] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 739.754835] 11:37:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb710", 0x5b, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055", 0xc, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) [ 749.643556] loop6: detected capacity change from 0 to 512 [ 749.668183] loop2: detected capacity change from 0 to 512 [ 749.691955] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 749.697858] EXT4-fs (loop6): get root inode failed [ 749.698748] EXT4-fs (loop6): mount failed [ 749.726955] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 749.731182] EXT4-fs (loop2): get root inode failed [ 749.732084] EXT4-fs (loop2): mount failed 11:37:30 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM', 0x3, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00', 0x4, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e26", 0x4a, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 749.990251] loop6: detected capacity change from 0 to 512 [ 750.014139] loop2: detected capacity change from 0 to 512 [ 750.033800] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 750.040263] EXT4-fs (loop2): get root inode failed [ 750.041087] EXT4-fs (loop2): mount failed [ 750.817503] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 750.817503] 11:37:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:39 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00', 0x4, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659be", 0x85, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c7", 0x39, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 11:37:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659be", 0x85, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 758.833856] loop2: detected capacity change from 0 to 512 [ 758.851771] loop6: detected capacity change from 0 to 512 [ 758.860209] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 758.864690] EXT4-fs (loop2): get root inode failed [ 758.865095] EXT4-fs (loop2): mount failed 11:37:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c7", 0x39, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74", 0x6b, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 758.990372] loop2: detected capacity change from 0 to 512 [ 759.020565] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 759.026284] EXT4-fs (loop2): get root inode failed [ 759.027316] EXT4-fs (loop2): mount failed [ 759.665627] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 759.665627] 11:37:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c7", 0x39, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:49 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00', 0x4, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)) 11:37:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x199, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:49 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f2", 0x28, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:37:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b", 0x6a, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 768.623051] loop6: detected capacity change from 0 to 512 [ 768.655869] loop2: detected capacity change from 0 to 512 11:37:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 768.695886] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 11:37:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 768.715717] EXT4-fs (loop2): get root inode failed [ 768.716137] EXT4-fs (loop2): mount failed 11:37:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:37:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)) 11:37:49 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f2", 0x28, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 768.928664] loop2: detected capacity change from 0 to 512 [ 768.954746] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 768.963284] EXT4-fs (loop2): get root inode failed [ 768.963728] EXT4-fs (loop2): mount failed [ 769.449619] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 769.449619] 11:38:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x172, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)) 11:38:00 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f2", 0x28, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 779.291540] loop6: detected capacity change from 0 to 512 [ 779.295747] loop2: detected capacity change from 0 to 512 11:38:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00', 0x4, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 779.337127] EXT4-fs error (device loop6): __ext4_fill_super:5553: inode #2: comm syz-executor.6: iget: bad i_size value: -6820241459971618816 [ 779.351618] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 779.354268] EXT4-fs (loop6): get root inode failed [ 779.355301] EXT4-fs (loop6): mount failed [ 779.369508] Process accounting resumed [ 779.372781] EXT4-fs (loop2): get root inode failed [ 779.373576] EXT4-fs (loop2): mount failed 11:38:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c627", 0xd3, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0), 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00', 0x4, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:00 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819a", 0x17, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 779.653700] loop6: detected capacity change from 0 to 512 11:38:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 779.700857] loop2: detected capacity change from 0 to 512 [ 779.722318] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 779.728273] EXT4-fs (loop2): get root inode failed [ 779.729075] EXT4-fs (loop2): mount failed [ 780.475624] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 780.475624] [ 790.675242] loop6: detected capacity change from 0 to 512 11:38:11 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00', 0x4, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:11 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {0x0, 0x0, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:11 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 790.770212] loop2: detected capacity change from 0 to 512 11:38:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 790.832156] No source specified 11:38:11 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 790.975021] EXT4-fs (sda): Online defrag not supported for non-extent files [ 791.504711] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 791.504711] [ 791.568650] EXT4-fs warning (device loop2): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 791.568650] 11:38:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00', 0x4, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 1) 11:38:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 1) 11:38:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 800.447344] loop6: detected capacity change from 0 to 512 [ 800.488739] loop2: detected capacity change from 0 to 512 11:38:21 executing program 4: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) (fail_nth: 1) close_range(r0, 0xffffffffffffffff, 0x0) 11:38:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 800.552118] FAULT_INJECTION: forcing a failure. [ 800.552118] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 800.553108] CPU: 1 UID: 0 PID: 7577 Comm: syz-executor.1 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 800.553124] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 800.553131] Call Trace: [ 800.553135] [ 800.553140] dump_stack_lvl+0xfa/0x120 [ 800.553162] should_fail_ex+0x4d7/0x5e0 [ 800.553184] _copy_from_user+0x30/0xd0 [ 800.553204] __ext4_ioctl+0x1099/0x38e0 [ 800.553225] ? __pfx___ext4_ioctl+0x10/0x10 [ 800.553239] ? find_held_lock+0x2b/0x80 [ 800.553259] ? ksys_write+0x121/0x240 [ 800.553279] ? lock_is_held_type+0x9e/0x120 [ 800.553293] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 800.553313] ? do_vfs_ioctl+0x125/0x1470 [ 800.553331] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 800.553346] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 800.553364] ? __mutex_unlock_slowpath+0xc1/0x740 [ 800.553378] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 800.553397] ? print_lock_class_header+0x13f/0x150 [ 800.553414] ? __fget_files+0x34/0x3b0 [ 800.553433] ? find_held_lock+0x2b/0x80 [ 800.553451] ? __fget_files+0x203/0x3b0 [ 800.553470] ? lock_release+0xc8/0x270 [ 800.553488] ? selinux_file_ioctl+0xb9/0x280 [ 800.553505] ? __pfx_ext4_ioctl+0x10/0x10 [ 800.553521] __x64_sys_ioctl+0x18f/0x210 [ 800.553539] do_syscall_64+0xbf/0x420 [ 800.553555] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 800.553568] RIP: 0033:0x7f20dfd35b19 [ 800.553577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 800.553589] RSP: 002b:00007f20dd2ab188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 800.553600] RAX: ffffffffffffffda RBX: 00007f20dfe48f60 RCX: 00007f20dfd35b19 [ 800.553609] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 800.553616] RBP: 00007f20dd2ab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 800.553623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 800.553631] R13: 00007ffcdb064abf R14: 00007f20dd2ab300 R15: 0000000000022000 [ 800.553647] 11:38:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 800.597127] FAULT_INJECTION: forcing a failure. [ 800.597127] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 800.598232] CPU: 1 UID: 0 PID: 7581 Comm: syz-executor.3 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 800.598270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 800.598287] Call Trace: [ 800.598296] [ 800.598307] dump_stack_lvl+0xfa/0x120 [ 800.598343] should_fail_ex+0x4d7/0x5e0 [ 800.598387] _copy_from_user+0x30/0xd0 [ 800.598434] __ext4_ioctl+0x1099/0x38e0 [ 800.598478] ? __pfx___ext4_ioctl+0x10/0x10 [ 800.598514] ? find_held_lock+0x2b/0x80 [ 800.598558] ? ksys_write+0x121/0x240 [ 800.598579] ? lock_is_held_type+0x9e/0x120 [ 800.598593] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 800.598613] ? do_vfs_ioctl+0x125/0x1470 [ 800.598629] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 800.598644] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 800.598662] ? __mutex_unlock_slowpath+0xc1/0x740 [ 800.598676] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 800.598695] ? print_lock_class_header+0x13f/0x150 [ 800.598707] ? __fget_files+0x34/0x3b0 [ 800.598726] ? find_held_lock+0x2b/0x80 [ 800.598745] ? __fget_files+0x203/0x3b0 [ 800.598764] ? lock_release+0xc8/0x270 [ 800.598782] ? selinux_file_ioctl+0xb9/0x280 [ 800.598799] ? __pfx_ext4_ioctl+0x10/0x10 [ 800.598815] __x64_sys_ioctl+0x18f/0x210 [ 800.598833] do_syscall_64+0xbf/0x420 [ 800.598849] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 800.598862] RIP: 0033:0x7f322658fb19 [ 800.598871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 800.598882] RSP: 002b:00007f3223b05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 800.598894] RAX: ffffffffffffffda RBX: 00007f32266a2f60 RCX: 00007f322658fb19 [ 800.598902] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 800.598909] RBP: 00007f3223b051d0 R08: 0000000000000000 R09: 0000000000000000 [ 800.598918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 800.598927] R13: 00007fff020a231f R14: 00007f3223b05300 R15: 0000000000022000 [ 800.598948] [ 801.273598] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 801.273598] [ 801.316479] EXT4-fs warning (device loop2): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 801.316479] 11:38:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:30 executing program 4: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:38:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 2) 11:38:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 2) 11:38:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 809.169673] loop2: detected capacity change from 0 to 512 11:38:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 809.217221] loop6: detected capacity change from 0 to 512 11:38:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 809.268484] FAULT_INJECTION: forcing a failure. [ 809.268484] name failslab, interval 1, probability 0, space 0, times 0 [ 809.269389] CPU: 1 UID: 0 PID: 7607 Comm: syz-executor.3 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 809.269404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 809.269415] Call Trace: [ 809.269420] [ 809.269424] dump_stack_lvl+0xfa/0x120 [ 809.269445] should_fail_ex+0x4d7/0x5e0 [ 809.269469] ? jbd2__journal_start+0x193/0x820 [ 809.269486] should_failslab+0xc2/0x120 [ 809.269500] kmem_cache_alloc_noprof+0x80/0x760 [ 809.269523] ? jbd2__journal_start+0x193/0x820 [ 809.269538] jbd2__journal_start+0x193/0x820 [ 809.269558] __ext4_journal_start_sb+0x325/0x580 [ 809.269572] ? ext4_move_extents+0xd2a/0x3790 [ 809.269587] ext4_move_extents+0xd2a/0x3790 [ 809.269604] ? __pfx_perf_trace_lock+0x10/0x10 [ 809.269626] ? perf_trace_lock+0xb5/0x5d0 [ 809.269639] ? __lock_acquire+0x451/0x2250 [ 809.269656] ? __lock_acquire+0x451/0x2250 [ 809.269669] ? __pfx_ext4_move_extents+0x10/0x10 [ 809.269683] ? __fget_files+0x34/0x3b0 [ 809.269705] ? lock_acquire+0x15e/0x2d0 [ 809.269718] ? __ext4_ioctl+0x114c/0x38e0 [ 809.269736] ? lock_is_held_type+0x9e/0x120 [ 809.269750] ? mnt_get_write_access_file+0x11f/0x180 [ 809.269773] __ext4_ioctl+0x118f/0x38e0 [ 809.269793] ? __pfx___ext4_ioctl+0x10/0x10 [ 809.269806] ? find_held_lock+0x2b/0x80 [ 809.269824] ? ksys_write+0x121/0x240 [ 809.269844] ? lock_is_held_type+0x9e/0x120 [ 809.269857] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 809.269880] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 809.269895] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 809.269913] ? __mutex_unlock_slowpath+0xc1/0x740 [ 809.269928] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 809.269946] ? print_lock_class_header+0x13f/0x150 [ 809.269958] ? __fget_files+0x34/0x3b0 [ 809.269977] ? find_held_lock+0x2b/0x80 [ 809.269994] ? __fget_files+0x203/0x3b0 [ 809.270013] ? lock_release+0xc8/0x270 [ 809.270031] ? selinux_file_ioctl+0xb9/0x280 [ 809.270048] ? __pfx_ext4_ioctl+0x10/0x10 [ 809.270064] __x64_sys_ioctl+0x18f/0x210 [ 809.270082] do_syscall_64+0xbf/0x420 [ 809.270099] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 809.270111] RIP: 0033:0x7f322658fb19 [ 809.270121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 809.270132] RSP: 002b:00007f3223b05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 809.270144] RAX: ffffffffffffffda RBX: 00007f32266a2f60 RCX: 00007f322658fb19 [ 809.270152] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 809.270159] RBP: 00007f3223b051d0 R08: 0000000000000000 R09: 0000000000000000 [ 809.270166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 809.270172] R13: 00007fff020a231f R14: 00007f3223b05300 R15: 0000000000022000 [ 809.270190] 11:38:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 809.338724] FAULT_INJECTION: forcing a failure. [ 809.338724] name failslab, interval 1, probability 0, space 0, times 0 [ 809.340526] CPU: 0 UID: 0 PID: 7613 Comm: syz-executor.1 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 809.340556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 809.340569] Call Trace: [ 809.340576] [ 809.340585] dump_stack_lvl+0xfa/0x120 [ 809.340617] should_fail_ex+0x4d7/0x5e0 [ 809.340652] ? jbd2__journal_start+0x193/0x820 [ 809.340682] should_failslab+0xc2/0x120 [ 809.340704] kmem_cache_alloc_noprof+0x80/0x760 [ 809.340745] ? jbd2__journal_start+0x193/0x820 [ 809.340774] jbd2__journal_start+0x193/0x820 [ 809.340811] __ext4_journal_start_sb+0x325/0x580 [ 809.340835] ? ext4_move_extents+0xd2a/0x3790 [ 809.340862] ext4_move_extents+0xd2a/0x3790 [ 809.340893] ? __pfx_perf_trace_lock+0x10/0x10 [ 809.340931] ? perf_trace_lock+0xb5/0x5d0 [ 809.340955] ? __lock_acquire+0x451/0x2250 [ 809.340987] ? __lock_acquire+0x451/0x2250 [ 809.341011] ? __pfx_ext4_move_extents+0x10/0x10 [ 809.341037] ? __fget_files+0x34/0x3b0 [ 809.341076] ? lock_acquire+0x15e/0x2d0 [ 809.341100] ? __ext4_ioctl+0x114c/0x38e0 [ 809.341132] ? lock_is_held_type+0x9e/0x120 [ 809.341157] ? mnt_get_write_access_file+0x11f/0x180 [ 809.341198] __ext4_ioctl+0x118f/0x38e0 [ 809.341235] ? __pfx___ext4_ioctl+0x10/0x10 [ 809.341261] ? find_held_lock+0x2b/0x80 [ 809.341294] ? ksys_write+0x121/0x240 [ 809.341329] ? lock_is_held_type+0x9e/0x120 [ 809.341354] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 809.341393] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 809.341429] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 809.341460] ? __mutex_unlock_slowpath+0xc1/0x740 [ 809.341486] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 809.341520] ? print_lock_class_header+0x13f/0x150 [ 809.341542] ? __fget_files+0x34/0x3b0 [ 809.341577] ? find_held_lock+0x2b/0x80 [ 809.341609] ? __fget_files+0x203/0x3b0 [ 809.341644] ? lock_release+0xc8/0x270 [ 809.341678] ? selinux_file_ioctl+0xb9/0x280 [ 809.341710] ? __pfx_ext4_ioctl+0x10/0x10 [ 809.341739] __x64_sys_ioctl+0x18f/0x210 [ 809.341772] do_syscall_64+0xbf/0x420 [ 809.341801] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 809.341823] RIP: 0033:0x7f20dfd35b19 [ 809.341840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 809.341860] RSP: 002b:00007f20dd28a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 809.341881] RAX: ffffffffffffffda RBX: 00007f20dfe49020 RCX: 00007f20dfd35b19 [ 809.341895] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 809.341909] RBP: 00007f20dd28a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 809.341922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 809.341935] R13: 00007ffcdb064abf R14: 00007f20dd28a300 R15: 0000000000022000 [ 809.341967] 11:38:30 executing program 4: setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100), &(0x7f0000000280), 0x2, 0x3) r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)=0x0) syz_io_uring_setup(0xd61, &(0x7f00000002c0)={0x0, 0xfe09, 0x8, 0x2, 0x18d, 0x0, r0}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000340), &(0x7f0000000380)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)=' ', 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_script(r3, 0x0, 0xc) close(r3) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f0000000740)=[{&(0x7f0000000500)=""/25, 0x19}, {&(0x7f0000000540)=""/36, 0x24}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/206, 0xce}], 0x4) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x7, 0x13, r2, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r4, 0x0, &(0x7f0000000000), 0x0, 0x4) syz_io_uring_submit(r4, r1, &(0x7f00000004c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x1, 0x4000, @fd_index=0x3, 0x3, &(0x7f0000000480)=""/41, 0x29, 0x10}, 0x7) r5 = socket$packet(0x11, 0x2, 0x300) read(r5, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) 11:38:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 3) [ 809.462271] Process accounting paused 11:38:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 3) 11:38:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 810.000732] EXT4-fs warning (device loop2): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 810.000732] [ 810.046542] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 810.046542] 11:38:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:41 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:41 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad687", 0xf, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 4) 11:38:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:41 executing program 4: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) recvmsg(r1, &(0x7f0000001640)={&(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000300)=""/34, 0x22}, {&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/85, 0x55}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/214, 0xd6}], 0x5, &(0x7f0000000640)=""/4096, 0x1000}, 0x40000100) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r4, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000001840)={{0x1, 0x1, 0x18, r1, {0x6, 0x1}}, './file0\x00'}) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r6, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000007540)=[{{0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f00000039c0)=""/48, 0x30}, {&(0x7f0000003a00)=""/151, 0x97}, {&(0x7f0000003ac0)=""/188, 0xbc}, {&(0x7f0000003b80)=""/7, 0x7}, {&(0x7f0000003bc0)=""/32, 0x20}, {&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/142, 0x8e}, {&(0x7f0000004cc0)=""/199, 0xc7}, {&(0x7f0000004dc0)=""/250, 0xfa}], 0x9, &(0x7f0000004f80)=""/18, 0x12}, 0x1}, {{&(0x7f0000004fc0)=@xdp, 0x80, &(0x7f0000005100)=[{&(0x7f0000005040)=""/105, 0x69}, {&(0x7f00000050c0)=""/39, 0x27}], 0x2}, 0x8000}, {{0x0, 0x0, &(0x7f0000006300)=[{&(0x7f0000005140)=""/25, 0x19}, {&(0x7f0000005180)=""/4096, 0x1000}, {&(0x7f0000006180)=""/47, 0x2f}, {&(0x7f00000061c0)=""/180, 0xb4}, {&(0x7f0000006280)=""/103, 0x67}], 0x5, &(0x7f0000006380)=""/4096, 0x1000}, 0x3ff}, {{&(0x7f0000007380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000007480)=[{&(0x7f0000007400)=""/69, 0x45}], 0x1, &(0x7f00000074c0)=""/87, 0x57}, 0x1}], 0x4, 0x21, &(0x7f0000007640)={0x0, 0x3938700}) r8 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r8, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r8, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) r9 = open(&(0x7f0000007800)='./file0\x00', 0x40, 0x81) [ 820.162258] loop6: detected capacity change from 0 to 512 [ 820.168405] loop2: detected capacity change from 0 to 512 [ 820.195106] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 820.204206] EXT4-fs (loop2): get root inode failed [ 820.205268] EXT4-fs (loop2): mount failed io_submit(0x0, 0x8, &(0x7f0000007880)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x200, r2, &(0x7f0000000000)="0b0d85e0c6124b5b338daff2261d9ef53e88d4d563a05b6e2f92bf11", 0x1c, 0x10001, 0x0, 0x2}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x8, 0x3, r3, &(0x7f0000001680)="ce09eca549578f17e7a772145f85819260de995c499ee31aa0dcb96bf65e7161cd6e1082db2dd428960ed6483d307dc846cb531dc17005c827c9d1c9a11e1ef016a7395f94d8d852442b3485edd0413eb34f60c905c22a8fe390c492db482837a73735522ca7bdce8be3ff2e9029506c76ccce8be062239112783e93bed322997834bdec0a6d671103de769ed0a4f67049663683f0a92c119aab63894e4a8c278e226b8a51bb0b9283380d0f70adc462abb9c46c98f5bce3dcdee867978c006f8a2dfc14e5c78d8e96d273e84ce88ba6b2f79d15f88edc4fcddeeda839bc1e0e7cff3ff7f3ead1d10761d25f9db7224aff", 0xf1, 0x7}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x5, 0x7ff, r4, &(0x7f00000017c0)="7f69abc9e610064b4900eb32356508ac7b0e37bebe648d807b075a25718991addeef4df5cb55396b7c734bdce5292f612bfbcbdfebecd7b6cb84d47b34a2f06779b23be381aaebc5", 0x48, 0x401, 0x0, 0x1, r5}, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x8, 0x1000, r1, &(0x7f00000018c0)="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", 0x1000, 0x3}, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x2, 0x5, r6, &(0x7f0000002900)="b3acda5abbfc34d27124e8c69aa95cbe07a7699f97be7e8ed24dea04e0838751e7a395239df9e5738edb8a9cac4430c594cb8a9de025764cb29ce13e8bef843e09ef410068d25928471d47eb4a8ac9e386d8433e081fcb8bb17b374a1a3bcae7b97bbaea158071c47c69eeec423d0ca999eaab5dd36a681ed55751f9115dfdbe4c59d252ecb3611db21b2e041d995958bc2127d3d3cf32720ea6a7471509d9e73a12428d468b7940bb3461c4efbd8c995cd14d872746c38d7342407c97c58184c810e610b84465f96b3440fc337352b49d8638e69069bdad47b4c3ac0808b24e5947e8c3edc0e4343171dbf230a3238a1ac8e3d3a09c39fcb6cf1f06390a5dff149daddd066445f01d5eced2f352c7d302a27bc6c834abe3fdf9f90f2d9dc8c78ddb54978960b11218e87d8cb4bd59b65739fd32e76afcf453a2719429d2b0328c378874887afdbb8c7f47f494688ecc11ea16b237e2aba5f89cbdc0c580dc458517ed4f6e47acffe29a1c14ee1e9e52094883ab2b5c1d0a2470de5f0a3ec3ab720366f307b3b71779209fd0dc0af6641530ad0dba17c9c20a4030577f7aaa4a9343444c422ee2ee48f1e5883bcd9445c89378a23c6f7de7202898b28c98efd938a7e4b0ac45814f5c92cbe541c7426a97c903ec0e2dc4609ad4f395c798a787ec94bcb7085eab8b81c64b0ef99a97a61203165d0551256dfda51c3ce8b4d996fef5aed90f36eee9b39efe0dfd2b21d6a65eb77d1dbf718b4c936a27eaaecda103a57820e6a8e3bdd4086c03391c69272b8c84353e8daa66d3aff3cb1f699c9bdcf281e0b663f9365779cf02cf8e81dd9b417d4081ca4b25dc957f19bdabea4178ec44d1ae6cb51cc9e0625869213fe4eceeb7850eecd57e4ccd9efd97757086f59f6b20a510cfabe5af0c8ba33b045877fca047197d006ab35a5e2ac061480054573015e0143f11df512c7ae1495d3023d7814d6c0eba93697f3b00c306b54dc1837d8e22ae33f9510e15daf0994288c3e404b71b146457a7ad8cdc433e858ec36a1cf0a0704b767cc9d8112f21f163a814688f873ad0ba32280d6018d281d1b955915ce97f92e1a15e690cfa744e36674b7cd620d3c4622cf31b96d37eb0e9e68d6e70c283b8dcbf8c909d9b3d636b283c8b088aa4562b7298b5740cec6bc26e134f71f622c2dbd7afa1236f42f3b764bfc5227cef5fb006777f080c2c8e957b481e83a5c7bb6983ab67736b847fede4f4b20d065950b216c3ef90f632e9ccc0408540e5c0ffee67ca5a52baf02bc7bff3d2538aa105234d5643365e546d9090ff7029c116388de9fb4ef2924e2d59ea6a0968f78bba37ad9d12f1fbbe8fe3481026f094180d9d2e8693291e6258bf96442fa8ea40b85869306e1f18b444b48c2ad80b6bd32cdd77467e68e739a39abe7077d707693255b7ac21588bd96c84a6ed60aabe692819ab17b0482eac184a6531f7cecc6666b30a3a11f5a4e94d87dd4cfc281ca12321f5f7d95c5d15e947b3ea797d9e86e353b1b222573642c54fffe4f39366352fd7f1bda6af0ea3927ec6857155c31b8fbf80f3ec8ad849d9f2ac1399d5586bd9134f04857c342e0235f433c53b43175208fcedd25221392582935c1598b5e91725bb82c729ac5f5a15594476c4ce8f26d29d5b9679bc578c07ba41d388b784d75d9c1d5912c5e03208d10d40f2f30d3c152269140c9e7d90a6452f3cb7d4aca8841810f67b133aa37bd1ff9534dc6a975a6acc832b9f8ee94e5e0165d4b9baeb9e0776bb115a1c0cbcb02d71f2896b3de038d5703eca2f3af7f1ee8657ec477b12a7e42602a2e90a8f5b283accb978fc9299e717744ee3f9dacde2bf1a7c005fb8c11f14028fe672116ce204183c80f9cace81d31c9be2a4acb2cfda19ede9fd601d8ac4517827a66d6468737ace37ef62fffe1ebe828f744cd357e15ad456fd311deaffe6fe277f413e28e9b9a81dcd05076a9a59fae417e9c263a388befbf412948d8b6e9085a44dbe1f659f3c0c1489bd70f7d3151822c829a9b66ce6906bfd823f7e06bcaf0ef0c7806350771635ddd41b26653f5376ad50f091e5b9af76bfc18adc80901d6a749bf83c4211245fbe4708a0ecaefd0663bc57407af4db59ff25c51f3e1bcb56a8413055f076bfdd38f44bac1a66c7ac9dbb21563309c2f927db87c7038cf8892562fa577ee3a67f28afb9d622c132cc529f8218cfe5c7152b182c1136d6a7a38f1ffd8ba95a3558c9e8303e2cb6d49bff3b45ee6feb695e70104ceaba563f7d631d29a7e2831f3fb50c3ee34f2ae5ac4c5ac41332e3f7519a7ab0474c6a9bdad97dcb25adc03b09076b2fe0a4d04caf5d8d3a50055bcb3ec2fce1c7f86fe42ccbd33ce1420fa24fa5c5b7e4c1b055d5a432b2b2cbd46ce30646631f0576a896e94d9afe7988754febf06ec9574f95a1bb036055bbbb512a84e25a985a9441896ae0162cd4fc0cb873ad93ddfebab6a0fdd1b090f22c284a1a410e314d4c081260a8331b0e0a1baef65abc3fdb95a8d310ea15b80c744d1c7a554e5d72fa98d07eaafc134a4145d81b90f09365811d9fcf549eb22b2a8b2a9739a535e95c64ae9e5235b7f5397d2180f79b58b0c5c0f5019184d1456345d3603fa4419949c3904b2cad3777db29499646818bb4ea91376f52a3819329fe32e69933408538357408759491ccaae08aea82912496306475a8bc3de6a2ad20f3cb2780316f8a435d1b3f91528d8654960c43d0fd62db1390de9bae56ce2b0c026c2f89085de956c3390ca52c8103c3cfe3046422a295eaf46a412ff5d3d086a76dd6f054c87ecfd7dfe3ed19fed9885632ee7db3933fac2b4cce839fead0f01e4d0138026d835e045f1c364fcdfe41b1078a38e147656fd13b095ea0029f75183136d8c2fb8ba4989a904d653023aa2bf1967bb39dc57045206f3ce1ccfab80499a66d702483ec913ac791e1c3508a4a729fd992e3e763c86af692b0acd1927c474617da737b1b693632e6744704417ec8abecbea761f6604c6d82e1403ad450251e0e8517ad73b7996aa9216539a827e1a06f5502b80588148a8e647793c00ba21793c8fb3dd3f494a547e640d706e9dcfb66ace743254299602d013ef7e4c4a7592d8b54a25876ad084290daee6bc10faa12d8334295a31dfe1fd81079545e49934cb18c3d6fc4723567ddb50fd98e139cb69425142d2d651a34f374c9174a5213b57523776b77ff88b0c6ae8d2096e304e5fab3c358033611cf02243ae147f76baa3e57f0fc581fd508d82878ef61099f003012912d5f9bfae60921814d2e0e4b2ed648de4fdb26379b11ded9b22cb12d836b2adb23ea63eb58830eec9aa48c80d127deecf9c3709e12a1bac78089d60385f36f1c4e2b534cebf2e99520bbd416095eb84031740b4880cd238513f0e115b27306354c420b381cd44cf0643f6087d559b26766a3da4941839df4b541033e6f448dbb32d58519768d4a86aa6729803dfff5aad4716e4797a5dd67417b0b28e4e275e6d9c8c9518ad5b9d821515a43eb981168b79e19b290ec82f0033fe1dbb7e2e1f1b21780af1b098ad603a5b593cd251f6872496cf76dc279c960248e2311185136074a12adde7ff1bb908cc56c0c43e30a86920fdc3e5106e70ac44c5c8d4cd342e566994ecbdca8ae1f5c37f9f4c8aee2690d438914e4e2aad77f1d8cffc116f40a9baaaad685e2cff7ff2de92ff1ee89e08207993a2681509da22fc462188c4dbd34cdce3e144030dfb1c0afc6817f14b4e9bba0b21b1593c1115250caa624288552e3472a4dc7db89ad964e86d6f7f2c7870a9c19e025d63bd6df3a1ab940162fd19a6dfaee553071fc871a19e3c0a82469076c8dbe918c057213153ee560eb0a20def128d8e0b1b8669a19adfc90e99d72327272ef0f620002f2ca99ed5116f0cb28a716078043fba65674a3b320b4e547bdc8965ce091bfdfa01b40b56944aa0ca999f8abb95e8e077ebcae66baa9adb553553db86d5d7ca037d8443f8679ada4902fb44eca5b465357980d1a8a4307579b002b80ec823c32f8ee8e19dddc0fce28787c88aef9f52a92d2022238826b09235a7085130265da0313e4e2b5478c1693d69b5e606297950dda02ba0988a6dc0ad5a7668c2f92e950c0dfd812ac7450e3a1a9d39d63c2d05d802712857404ac8a7e59092679083bdb1ab9b1b21adc2a72622028ccc07ac857b161f8a53ada9f6fac0eb4b5d5ba47000d0e88ff0fd377b6f25f7754b248da881c74f725926016695fbe4b5df3a2997c4c8db432dc2ba9aa4f47bee074a1618ac7234c55b7bacb156a2bb4fc3585ffe5c6b9306e53896a603455e1e38bf8e960de1b36603db61953413fd512fbda992f639e244c93717606dd2bf7918faed7e4227156a73d17c757201c373ece9a272e0f7bef0b3d5b8806b70ab657ef27f2c6c614ad814f267cc5953af5510e1d834ea4eb535840cc7eb602d96240a48f2b461057c7ec3cda9cf3d128a1466b27e3f29b27d6fdeeef3f2bd5b14f15ac8ccae345888ebb7bbab7d9f7868b7d75e3df5c5c413d068f0fae5661043bd81e7935250b0ca83b929ce3c3ad88a1786a62aa8cbacaee46636ea76eadc14fe595867bf7c68e8d9db3f88f17680d750b15c49a2a53c39920abe4445d93ad8627e7a139e8032384a6f9643545c42f6c951c4b819ca4806362848854380f5880e56d320c1afea979d993bd91d7eef2e76de8fe0bfe9fc37c216b5e950a7c1a1f87cb6174b2dd5f2e0de906a4e979cc3b599191a0a27d10c26d9809406e6d289c7b3a74f19cd2c29ba4f08418519d14eb4816cfc80d067b7df22c5bcf15be40f454df159b3ffc0aa5fc06f61fd3f4ba47bfbd44c6048b4fdd419ae06acca820f3fc8dbe7f7cffb5b11904458b4057569ed252de85b8715e656bca4ae22f55803484729f76b25e7e7abf71983308c6e6183d3df87d4909eec1f0c8a930ba5f0ce90410ff70848f75d377ec40797d15144d7f777ed63bd69fa13a1104db31c03caad8cde5211a5165490d24576fc3b69cd4002f227c53a2b5d59e8323d79866edfc2d10e4a332fe9d269d3d24f70147c40e56a0b4321a2887a888ad0a738336654699b6c387287396e80e8281c7f4c9c777132a64dec13f91910b3992b1f33038acaffbf31c68c5ca657a27631fab9a2224d100395ab7560331ef2e5be54ca67ef77740ff30a6293cdbbba845af11559353ef2f7945fede2056396e7dfcfdffeb4bd66e9528e975e1f71b5962378be8e05ec197b5ed8ef7eec1ee748c4c424b0ead8dfa44a54bcc1ee0b591470f776a4bd242a2f6ed1a9db1d7bb8cf04f35e12826bccc693f8da0d1dbfdca649d02e30152542bf4f10bac6572c1662c6b4f2f652af90b41611bc4655a1df4c8ded3b84cba1fbcac427d5c8e6bd91cd2add0c8f274f2796547875f4af0683b67e7842007656790ba705dfdede4890ce493a5c297a9a3dc1babf8a8b6245c803d22db91ac715c5d50eddaec0cb693f3c6de5ba24fef5fb4634de1e5c3388b706fd876239dcdc8fa7d8fc1e9292cea027c9b2e031b0791040d535860cfdcc4acbf32d33e8eebe0754cfecf69a55e471a3d4f2b2b741b1e51a32b225e0c2e4040136676c93a45dd670f37a6f9384f902599d1a5b3855b99368851c0519393b1738cdde9573656c45dc252abc749110d10615ccdb85ea0b2583e35ea2443aeddb1abc443ef28e7e301936dcadd7d1275dd34314522d6fedf13ab70f1c15d7f7607f26dc3a6cd387cd891f9d37a2ad02567d7f833", 0x1000, 0x1, 0x0, 0x1}, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0xfffd, r1, &(0x7f0000003940), 0x0, 0x74}, &(0x7f0000007780)={0x0, 0x0, 0x0, 0x1, 0x2327, r7, &(0x7f0000007680)="a305b952c073b1610c4ecf2b9d3d130b7a7d1d5baea9c32f3bfe55792a7ce3acd5996bd715c01a2681989594003a68e0824cf4035435b8d1545b32c17ddcc6f25bdf626c764f627f272f7323ad4cfc52d292dacdc085bc9cdc9dfc1b29844f21501e041dae6e0448e35d3769580ceb664592cbfd35d6910fe30a226384ce1ae8f267e6fe3f30272fd15c41eb84fcc8ceab0f36ae983252876c68c984c9b8173987239d2395cc2746c9875a991dfcad7b4399d44ea29f417a9db64dc3f12ed0320466d9c7f0fbd315aae185f291d6617f1ce6a6a7a63cd469e2023ca9d0114a2eed7b88d6ab682a33", 0xe8, 0xfffffffffffff801, 0x0, 0x2}, &(0x7f0000007840)={0x0, 0x0, 0x0, 0x0, 0xffff, r8, &(0x7f00000077c0), 0x0, 0x3, 0x0, 0x1, r9}]) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r0, 0x10000000) close_range(r0, 0xffffffffffffffff, 0x0) 11:38:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 4) 11:38:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:41 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad687", 0xf, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 820.324552] FAULT_INJECTION: forcing a failure. [ 820.324552] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 820.326655] CPU: 0 UID: 0 PID: 7653 Comm: syz-executor.1 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 820.326705] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 820.326727] Call Trace: [ 820.326739] [ 820.326753] dump_stack_lvl+0xfa/0x120 [ 820.326803] should_fail_ex+0x4d7/0x5e0 [ 820.326862] should_fail_alloc_page+0xe0/0x110 [ 820.326903] prepare_alloc_pages+0x1eb/0x550 [ 820.326942] ? __is_insn_slot_addr+0x136/0x290 [ 820.326987] __alloc_frozen_pages_noprof+0x17f/0x2000 [ 820.327045] ? __is_insn_slot_addr+0x140/0x290 [ 820.327087] ? kernel_text_address+0x5b/0xc0 [ 820.327134] ? __kernel_text_address+0xd/0x40 [ 820.327168] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 820.327195] ? __lock_acquire+0x451/0x2250 [ 820.327239] ? perf_trace_lock+0xb5/0x5d0 [ 820.327264] ? __lock_acquire+0x451/0x2250 [ 820.327287] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 820.327337] ? policy_nodemask+0xeb/0x4e0 [ 820.327371] alloc_pages_mpol+0xed/0x340 [ 820.327401] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 820.327438] ? filemap_get_entry+0x1b1/0x3b0 [ 820.327467] ? lock_release+0xc8/0x270 [ 820.327496] folio_alloc_noprof+0x22/0x290 [ 820.327531] filemap_alloc_folio_noprof.part.0+0x372/0x410 [ 820.327576] ? __pfx_filemap_alloc_folio_noprof.part.0+0x10/0x10 [ 820.327619] ? jbd2__journal_start+0xf6/0x820 [ 820.327657] __filemap_get_folio_mpol+0x513/0x9a0 [ 820.327685] ? __ext4_journal_start_sb+0x1e3/0x580 [ 820.327716] ext4_move_extents+0xfa5/0x3790 [ 820.327760] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 820.327785] ? finish_task_switch.isra.0+0x1ec/0x7f0 [ 820.327832] ? __lock_acquire+0x451/0x2250 [ 820.327856] ? __pfx_ext4_move_extents+0x10/0x10 [ 820.327889] ? lock_acquire+0x15e/0x2d0 [ 820.327913] ? __ext4_ioctl+0x114c/0x38e0 [ 820.327945] ? lock_is_held_type+0x9e/0x120 [ 820.327971] ? mnt_get_write_access_file+0x11f/0x180 [ 820.328014] __ext4_ioctl+0x118f/0x38e0 [ 820.328041] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 820.328066] ? irqentry_exit+0x17b/0x650 [ 820.328089] ? irqentry_exit+0x17b/0x650 [ 820.328112] ? trace_hardirqs_off_finish+0xe3/0x110 [ 820.328140] ? __pfx___ext4_ioctl+0x10/0x10 [ 820.328176] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 820.328214] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 820.328243] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 820.328275] ? __mutex_unlock_slowpath+0xc1/0x740 [ 820.328301] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 820.328335] ? print_lock_class_header+0x13f/0x150 [ 820.328357] ? __fget_files+0x34/0x3b0 [ 820.328392] ? find_held_lock+0x2b/0x80 [ 820.328426] ? __fget_files+0x203/0x3b0 [ 820.328460] ? lock_release+0xc8/0x270 [ 820.328494] ? selinux_file_ioctl+0xb9/0x280 [ 820.328527] ? __pfx_ext4_ioctl+0x10/0x10 [ 820.328556] __x64_sys_ioctl+0x18f/0x210 [ 820.328589] do_syscall_64+0xbf/0x420 [ 820.328620] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 820.328642] RIP: 0033:0x7f20dfd35b19 [ 820.328659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 820.328679] RSP: 002b:00007f20dd2ab188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 820.328701] RAX: ffffffffffffffda RBX: 00007f20dfe48f60 RCX: 00007f20dfd35b19 [ 820.328716] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 820.328729] RBP: 00007f20dd2ab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 820.328742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 820.328755] R13: 00007ffcdb064abf R14: 00007f20dd2ab300 R15: 0000000000022000 [ 820.328788] [ 820.334132] FAULT_INJECTION: forcing a failure. [ 820.334132] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 820.383857] CPU: 1 UID: 0 PID: 7648 Comm: syz-executor.3 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 820.383890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 820.383902] Call Trace: [ 820.383912] [ 820.383922] dump_stack_lvl+0xfa/0x120 [ 820.383959] should_fail_ex+0x4d7/0x5e0 [ 820.383998] should_fail_alloc_page+0xe0/0x110 [ 820.384023] prepare_alloc_pages+0x1eb/0x550 11:38:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 820.384046] ? __is_insn_slot_addr+0x136/0x290 [ 820.384073] __alloc_frozen_pages_noprof+0x17f/0x2000 [ 820.384105] ? __is_insn_slot_addr+0x140/0x290 [ 820.384130] ? kernel_text_address+0x5b/0xc0 [ 820.384158] ? __kernel_text_address+0xd/0x40 [ 820.384190] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 820.384218] ? __lock_acquire+0x451/0x2250 [ 820.384261] ? perf_trace_lock+0xb5/0x5d0 [ 820.384286] ? __lock_acquire+0x451/0x2250 [ 820.384309] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 820.384344] ? policy_nodemask+0xeb/0x4e0 [ 820.384377] alloc_pages_mpol+0xed/0x340 [ 820.384407] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 820.384445] ? filemap_get_entry+0x1b1/0x3b0 [ 820.384475] ? lock_release+0xc8/0x270 [ 820.384504] folio_alloc_noprof+0x22/0x290 [ 820.384538] filemap_alloc_folio_noprof.part.0+0x372/0x410 [ 820.384583] ? __pfx_filemap_alloc_folio_noprof.part.0+0x10/0x10 [ 820.384626] ? jbd2__journal_start+0xf6/0x820 [ 820.384665] __filemap_get_folio_mpol+0x513/0x9a0 [ 820.384692] ? __ext4_journal_start_sb+0x1e3/0x580 [ 820.384724] ext4_move_extents+0xfa5/0x3790 [ 820.384768] ? perf_trace_lock+0xb5/0x5d0 [ 820.384792] ? __lock_acquire+0x451/0x2250 [ 820.384824] ? __lock_acquire+0x451/0x2250 [ 820.384848] ? __pfx_ext4_move_extents+0x10/0x10 [ 820.384873] ? __fget_files+0x34/0x3b0 [ 820.384914] ? lock_acquire+0x15e/0x2d0 [ 820.384938] ? __ext4_ioctl+0x114c/0x38e0 [ 820.384970] ? lock_is_held_type+0x9e/0x120 [ 820.384995] ? mnt_get_write_access_file+0x11f/0x180 [ 820.385037] __ext4_ioctl+0x118f/0x38e0 [ 820.385074] ? __pfx___ext4_ioctl+0x10/0x10 [ 820.385099] ? find_held_lock+0x2b/0x80 [ 820.385132] ? ksys_write+0x121/0x240 [ 820.385167] ? lock_is_held_type+0x9e/0x120 [ 820.385192] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 820.385230] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 820.385259] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 820.385291] ? __mutex_unlock_slowpath+0xc1/0x740 [ 820.385317] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 820.385350] ? print_lock_class_header+0x13f/0x150 [ 820.385373] ? __fget_files+0x34/0x3b0 [ 820.385408] ? find_held_lock+0x2b/0x80 [ 820.385440] ? __fget_files+0x203/0x3b0 [ 820.385475] ? lock_release+0xc8/0x270 [ 820.385509] ? selinux_file_ioctl+0xb9/0x280 [ 820.385541] ? __pfx_ext4_ioctl+0x10/0x10 [ 820.385570] __x64_sys_ioctl+0x18f/0x210 [ 820.385604] do_syscall_64+0xbf/0x420 [ 820.385635] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 820.385658] RIP: 0033:0x7f322658fb19 [ 820.385676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 820.385697] RSP: 002b:00007f3223b05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 820.385718] RAX: ffffffffffffffda RBX: 00007f32266a2f60 RCX: 00007f322658fb19 [ 820.385733] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 820.385746] RBP: 00007f3223b051d0 R08: 0000000000000000 R09: 0000000000000000 [ 820.385759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 820.385771] R13: 00007fff020a231f R14: 00007f3223b05300 R15: 0000000000022000 [ 820.385804] 11:38:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 5) 11:38:41 executing program 4: prctl$PR_SET_TSC(0x1a, 0x1) r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080)={0x0, 0xfffffffe, 0x0, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:38:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 5) [ 820.590572] loop2: detected capacity change from 0 to 512 11:38:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 820.626848] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 820.640770] EXT4-fs (loop2): get root inode failed [ 820.641542] EXT4-fs (loop2): mount failed [ 820.763340] FAULT_INJECTION: forcing a failure. [ 820.763340] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 820.765218] CPU: 1 UID: 0 PID: 7673 Comm: syz-executor.3 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 820.765246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 820.765259] Call Trace: [ 820.765267] [ 820.765275] dump_stack_lvl+0xfa/0x120 [ 820.765309] should_fail_ex+0x4d7/0x5e0 [ 820.765346] should_fail_alloc_page+0xe0/0x110 [ 820.765371] prepare_alloc_pages+0x1eb/0x550 [ 820.765394] ? __is_insn_slot_addr+0x136/0x290 [ 820.765433] __alloc_frozen_pages_noprof+0x17f/0x2000 [ 820.765465] ? perf_trace_lock+0xb5/0x5d0 [ 820.765495] ? perf_trace_lock+0xb5/0x5d0 [ 820.765522] ? __pfx_perf_trace_lock+0x10/0x10 [ 820.765547] ? __pfx_css_rstat_updated+0x10/0x10 [ 820.765585] ? __pfx_perf_trace_lock+0x10/0x10 [ 820.765613] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 820.765644] ? find_held_lock+0x2b/0x80 [ 820.765691] ? perf_trace_lock+0xb5/0x5d0 [ 820.765715] ? __lock_acquire+0x451/0x2250 [ 820.765739] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 820.765774] ? policy_nodemask+0xeb/0x4e0 [ 820.765807] alloc_pages_mpol+0xed/0x340 [ 820.765836] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 820.765869] ? filemap_get_entry+0x1b1/0x3b0 [ 820.765901] ? lock_release+0xc8/0x270 [ 820.765930] folio_alloc_noprof+0x22/0x290 [ 820.765964] filemap_alloc_folio_noprof.part.0+0x372/0x410 [ 820.766009] ? __pfx_filemap_alloc_folio_noprof.part.0+0x10/0x10 [ 820.766052] ? jbd2__journal_start+0xf6/0x820 [ 820.766091] __filemap_get_folio_mpol+0x513/0x9a0 [ 820.766118] ? __ext4_journal_start_sb+0x1e3/0x580 [ 820.766149] ext4_move_extents+0x1028/0x3790 [ 820.766193] ? perf_trace_lock+0xb5/0x5d0 [ 820.766218] ? __lock_acquire+0x451/0x2250 [ 820.766249] ? __lock_acquire+0x451/0x2250 [ 820.766273] ? __pfx_ext4_move_extents+0x10/0x10 [ 820.766298] ? __fget_files+0x34/0x3b0 [ 820.766340] ? lock_acquire+0x15e/0x2d0 [ 820.766363] ? __ext4_ioctl+0x114c/0x38e0 [ 820.766396] ? lock_is_held_type+0x9e/0x120 [ 820.766422] ? mnt_get_write_access_file+0x11f/0x180 [ 820.766464] __ext4_ioctl+0x118f/0x38e0 [ 820.766500] ? __pfx___ext4_ioctl+0x10/0x10 [ 820.766526] ? find_held_lock+0x2b/0x80 [ 820.766559] ? ksys_write+0x121/0x240 [ 820.766594] ? lock_is_held_type+0x9e/0x120 [ 820.766619] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 820.766657] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 820.766686] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 820.766718] ? __mutex_unlock_slowpath+0xc1/0x740 [ 820.766745] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 820.766778] ? print_lock_class_header+0x13f/0x150 [ 820.766801] ? __fget_files+0x34/0x3b0 [ 820.766835] ? find_held_lock+0x2b/0x80 [ 820.766868] ? __fget_files+0x203/0x3b0 [ 820.766902] ? lock_release+0xc8/0x270 [ 820.766936] ? selinux_file_ioctl+0xb9/0x280 [ 820.766969] ? __pfx_ext4_ioctl+0x10/0x10 [ 820.766998] __x64_sys_ioctl+0x18f/0x210 [ 820.767030] do_syscall_64+0xbf/0x420 [ 820.767061] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 820.767083] RIP: 0033:0x7f322658fb19 [ 820.767100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 820.767120] RSP: 002b:00007f3223b05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 820.767142] RAX: ffffffffffffffda RBX: 00007f32266a2f60 RCX: 00007f322658fb19 [ 820.767156] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 820.767169] RBP: 00007f3223b051d0 R08: 0000000000000000 R09: 0000000000000000 [ 820.767182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 820.767195] R13: 00007fff020a231f R14: 00007f3223b05300 R15: 0000000000022000 [ 820.767227] [ 820.915305] FAULT_INJECTION: forcing a failure. [ 820.915305] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 820.917250] CPU: 0 UID: 0 PID: 7676 Comm: syz-executor.1 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 820.917280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 820.917293] Call Trace: [ 820.917300] [ 820.917308] dump_stack_lvl+0xfa/0x120 [ 820.917344] should_fail_ex+0x4d7/0x5e0 [ 820.917382] should_fail_alloc_page+0xe0/0x110 [ 820.917407] prepare_alloc_pages+0x1eb/0x550 [ 820.917437] ? __is_insn_slot_addr+0x136/0x290 [ 820.917470] __alloc_frozen_pages_noprof+0x17f/0x2000 [ 820.917502] ? perf_trace_lock+0xb5/0x5d0 [ 820.917532] ? perf_trace_lock+0xb5/0x5d0 [ 820.917559] ? __pfx_perf_trace_lock+0x10/0x10 [ 820.917584] ? __pfx_css_rstat_updated+0x10/0x10 [ 820.917622] ? __pfx_perf_trace_lock+0x10/0x10 [ 820.917650] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 820.917682] ? find_held_lock+0x2b/0x80 [ 820.917729] ? perf_trace_lock+0xb5/0x5d0 [ 820.917753] ? __lock_acquire+0x451/0x2250 [ 820.917778] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 820.917813] ? policy_nodemask+0xeb/0x4e0 [ 820.917846] alloc_pages_mpol+0xed/0x340 [ 820.917876] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 820.917906] ? filemap_get_entry+0x1b1/0x3b0 [ 820.917936] ? lock_release+0xc8/0x270 [ 820.917965] folio_alloc_noprof+0x22/0x290 [ 820.917999] filemap_alloc_folio_noprof.part.0+0x372/0x410 [ 820.918045] ? __pfx_filemap_alloc_folio_noprof.part.0+0x10/0x10 [ 820.918088] ? jbd2__journal_start+0xf6/0x820 [ 820.918127] __filemap_get_folio_mpol+0x513/0x9a0 [ 820.918155] ? __ext4_journal_start_sb+0x1e3/0x580 [ 820.918187] ext4_move_extents+0x1028/0x3790 [ 820.918230] ? perf_trace_lock+0xb5/0x5d0 [ 820.918255] ? __lock_acquire+0x451/0x2250 [ 820.918287] ? __lock_acquire+0x451/0x2250 [ 820.918311] ? __pfx_ext4_move_extents+0x10/0x10 [ 820.918336] ? __fget_files+0x34/0x3b0 [ 820.918377] ? lock_acquire+0x15e/0x2d0 [ 820.918401] ? __ext4_ioctl+0x114c/0x38e0 [ 820.918434] ? lock_is_held_type+0x9e/0x120 [ 820.918460] ? mnt_get_write_access_file+0x11f/0x180 [ 820.918502] __ext4_ioctl+0x118f/0x38e0 [ 820.918539] ? __pfx___ext4_ioctl+0x10/0x10 [ 820.918564] ? find_held_lock+0x2b/0x80 [ 820.918598] ? ksys_write+0x121/0x240 [ 820.918633] ? lock_is_held_type+0x9e/0x120 [ 820.918658] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 820.918696] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 820.918725] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 820.918757] ? __mutex_unlock_slowpath+0xc1/0x740 [ 820.918784] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 820.918817] ? print_lock_class_header+0x13f/0x150 [ 820.918840] ? __fget_files+0x34/0x3b0 [ 820.918874] ? find_held_lock+0x2b/0x80 [ 820.918907] ? __fget_files+0x203/0x3b0 [ 820.918942] ? lock_release+0xc8/0x270 [ 820.918976] ? selinux_file_ioctl+0xb9/0x280 [ 820.919008] ? __pfx_ext4_ioctl+0x10/0x10 [ 820.919038] __x64_sys_ioctl+0x18f/0x210 [ 820.919071] do_syscall_64+0xbf/0x420 [ 820.919102] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 820.919124] RIP: 0033:0x7f20dfd35b19 [ 820.919142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 820.919162] RSP: 002b:00007f20dd2ab188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 820.919183] RAX: ffffffffffffffda RBX: 00007f20dfe48f60 RCX: 00007f20dfd35b19 [ 820.919198] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 820.919211] RBP: 00007f20dd2ab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 820.919224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 820.919237] R13: 00007ffcdb064abf R14: 00007f20dd2ab300 R15: 0000000000022000 [ 820.919270] [ 820.984549] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 820.984549] 11:38:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 6) 11:38:51 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 6) 11:38:51 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:51 executing program 4: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffff}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x3, 0xb004}, 0x4) read(r1, &(0x7f0000000180)=""/230, 0xe6) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000280)=@req3={0x1000, 0x1, 0x400, 0x4}, 0x1c) sendmmsg$inet(r3, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) pread64(r3, &(0x7f0000000280)=""/82, 0x52, 0x81) close_range(r0, 0xffffffffffffffff, 0x0) [ 830.476504] loop2: detected capacity change from 0 to 512 [ 830.497528] loop6: detected capacity change from 0 to 512 [ 830.552196] FAULT_INJECTION: forcing a failure. [ 830.552196] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 830.553349] CPU: 1 UID: 0 PID: 7702 Comm: syz-executor.1 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 830.553365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 830.553373] Call Trace: [ 830.553379] [ 830.553384] dump_stack_lvl+0xfa/0x120 [ 830.553407] should_fail_ex+0x4d7/0x5e0 [ 830.553438] should_fail_alloc_page+0xe0/0x110 [ 830.553456] prepare_alloc_pages+0x1eb/0x550 [ 830.553471] ? __pfx_perf_trace_lock+0x10/0x10 [ 830.553496] __alloc_frozen_pages_noprof+0x17f/0x2000 [ 830.553516] ? perf_trace_lock+0xb5/0x5d0 [ 830.553531] ? perf_trace_lock+0xb5/0x5d0 [ 830.553546] ? __pfx_perf_trace_lock+0x10/0x10 [ 830.553560] ? __pfx_css_rstat_updated+0x10/0x10 [ 830.553581] ? __pfx_perf_trace_lock+0x10/0x10 [ 830.553596] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 830.553613] ? find_held_lock+0x2b/0x80 [ 830.553638] ? perf_trace_lock+0xb5/0x5d0 [ 830.553651] ? __lock_acquire+0x451/0x2250 [ 830.553664] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 830.553684] ? policy_nodemask+0xeb/0x4e0 [ 830.553703] alloc_pages_mpol+0xed/0x340 [ 830.553719] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 830.553735] ? filemap_get_entry+0x1b1/0x3b0 [ 830.553752] ? lock_release+0xc8/0x270 [ 830.553768] folio_alloc_noprof+0x22/0x290 [ 830.553786] filemap_alloc_folio_noprof.part.0+0x372/0x410 [ 830.553811] ? __pfx_filemap_alloc_folio_noprof.part.0+0x10/0x10 [ 830.553835] ? jbd2__journal_start+0xf6/0x820 [ 830.553856] __filemap_get_folio_mpol+0x513/0x9a0 [ 830.553871] ? __ext4_journal_start_sb+0x1e3/0x580 [ 830.553888] ext4_move_extents+0x1028/0x3790 [ 830.553912] ? perf_trace_lock+0xb5/0x5d0 [ 830.553926] ? __lock_acquire+0x451/0x2250 [ 830.553943] ? __lock_acquire+0x451/0x2250 [ 830.553956] ? __pfx_ext4_move_extents+0x10/0x10 [ 830.553969] ? __fget_files+0x34/0x3b0 [ 830.553992] ? lock_acquire+0x15e/0x2d0 [ 830.554005] ? __ext4_ioctl+0x114c/0x38e0 [ 830.554023] ? lock_is_held_type+0x9e/0x120 [ 830.554037] ? mnt_get_write_access_file+0x11f/0x180 [ 830.554060] __ext4_ioctl+0x118f/0x38e0 [ 830.554079] ? __pfx___ext4_ioctl+0x10/0x10 [ 830.554093] ? find_held_lock+0x2b/0x80 [ 830.554111] ? ksys_write+0x121/0x240 [ 830.554131] ? lock_is_held_type+0x9e/0x120 [ 830.554144] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 830.554165] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 830.554180] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 830.554198] ? __mutex_unlock_slowpath+0xc1/0x740 [ 830.554213] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 830.554231] ? print_lock_class_header+0x13f/0x150 [ 830.554243] ? __fget_files+0x34/0x3b0 [ 830.554261] ? find_held_lock+0x2b/0x80 [ 830.554279] ? __fget_files+0x203/0x3b0 [ 830.554297] ? lock_release+0xc8/0x270 [ 830.554316] ? selinux_file_ioctl+0xb9/0x280 [ 830.554334] ? __pfx_ext4_ioctl+0x10/0x10 [ 830.554349] __x64_sys_ioctl+0x18f/0x210 [ 830.554367] do_syscall_64+0xbf/0x420 [ 830.554384] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 830.554396] RIP: 0033:0x7f20dfd35b19 [ 830.554406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.554417] RSP: 002b:00007f20dd2ab188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 830.554429] RAX: ffffffffffffffda RBX: 00007f20dfe48f60 RCX: 00007f20dfd35b19 [ 830.554436] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 830.554444] RBP: 00007f20dd2ab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 830.554451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 830.554458] R13: 00007ffcdb064abf R14: 00007f20dd2ab300 R15: 0000000000022000 [ 830.554475] 11:38:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:38:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:38:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 7) 11:38:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 7) [ 830.795157] forcing mempool usage for bio_alloc_bioset+0x3f1/0x8f0 [ 830.800850] forcing mempool usage for bio_alloc_bioset+0x3f1/0x8f0 [ 831.301485] EXT4-fs warning (device loop2): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 831.301485] [ 831.335768] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 831.335768] 11:39:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 8) 11:39:00 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:00 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 8) 11:39:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:00 executing program 4: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x6fb6, &(0x7f0000000000)={0x0, 0xb953, 0x0, 0x0, 0x1ac}, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r3, 0x890c, &(0x7f0000000000)={0x0, @xdp={0x2c, 0x0, 0x0, 0x34}, @in={0x2, 0x4e24, @empty}, @llc={0x1a, 0xffff, 0x1, 0xff, 0x0, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x10000000007f, 0x2}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x3}}, 0x0, r6}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback, 0x0, 0x20}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000740)=0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000c80)=ANY=[@ANYBLOB="dc0100001800000125bd7000fedbdf25000000000000000000000000000000000a0101020000000000000000000000004e2404014e2300000000000000000012005232c5631a1d434f42f8ca6687aacaf5d7eb630080743b56b9bf4c6651c3acf892efcc9e6878d11a5d78000000226f3d17103ea23501b5dad13754c00ea648501359a29af75a551c5e3b60b89ad6ac95000000000000000000000000000000006dff4b89cf9b535ed03b96c561f21cd6086e7b5afc211e1e6c227c79e50ef42b9eab243308444b698acab9572ddcb382e41280", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0a010100000000000000000000000000000004d23300000064010100000000000000000000000000c5ffffffffffffff05000000000000e900040000000000002100000000000000ff0000000000000040000000000000fd030000000000000000fcffffffffffff0104000000000000d10200000000000009000000000000000800000000000000000800bb0200000002000027bd70000740bf49916e7bb313eb5f1b3500000a0006060200000000000000b500000000000000e4000600fe800000000000000000000000000037000000000000000000000000000000004e20009b4e23", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="ac1414aa000000000000000000000000000004d46c00000000000000000000000000000000000000dd0e0000000000004d0000000000000000010000000000000200000000000000060000000000000005000000000000010000000000000000000005000000000000005f9300000000000008000000000000002000000007000000500f000028bd700007350000060002d64700"/168], 0x1dc}, 0x1, 0x0, 0x0, 0x4000011}, 0x40084) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)=@ll={0x11, 0xf5, r6, 0x1, 0x4, 0x6, @random="d8f4d14d8f2d"}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000200)="f367f041c470da6da401aca4a15f7894e27eba90d9e338f4d5f3c06f888f264896603bdb69b8", 0x26}], 0x1, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], 0x3d0}, 0x0, 0x8000000, 0x1, {0x0, r8}}, 0x6) syz_io_uring_submit(0x0, r2, &(0x7f0000000100)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index, 0x3f, 0x0, 0x0, 0x0, 0x1, {0x0, r8}}, 0x3f) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000000)={0x200000, 0x92}, &(0x7f0000000040)='./file0\x00', 0x18, 0x0, 0x23456}, 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000000)={0x204080, 0x10, 0x2}, &(0x7f0000000100)='./file0\x00', 0x18, 0x0, 0x12345}, 0x20) r9 = socket$packet(0x11, 0x2, 0x300) read(r9, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) [ 839.891145] loop6: detected capacity change from 0 to 512 [ 839.898201] loop2: detected capacity change from 0 to 512 [ 839.927997] Process accounting resumed 11:39:01 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:01 executing program 4: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080)={0x0, 0xfffffffe}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000280), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, r0, 0x0) socket$packet(0x11, 0x2, 0x300) r2 = syz_open_dev$hiddev(&(0x7f0000000000), 0x9, 0x40200) signalfd(r2, &(0x7f0000000100)={[0x401]}, 0x8) 11:39:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 9) 11:39:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 9) [ 840.062070] forcing mempool usage for bio_alloc_bioset+0x3f1/0x8f0 11:39:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 10) 11:39:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 840.719278] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 840.719278] [ 840.721402] EXT4-fs warning (device loop2): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 840.721402] 11:39:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 849.861536] loop2: detected capacity change from 0 to 512 11:39:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 11) 11:39:10 executing program 4: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080)={0x0, 0x0, 0x28}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) 11:39:10 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 10) 11:39:10 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 849.914071] loop6: detected capacity change from 0 to 512 11:39:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 849.963969] FAULT_INJECTION: forcing a failure. [ 849.963969] name failslab, interval 1, probability 0, space 0, times 0 [ 849.966338] CPU: 0 UID: 0 PID: 7773 Comm: syz-executor.1 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 849.966370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 849.966383] Call Trace: [ 849.966391] [ 849.966401] dump_stack_lvl+0xfa/0x120 [ 849.966445] should_fail_ex+0x4d7/0x5e0 [ 849.966485] should_failslab+0xc2/0x120 [ 849.966509] __kmalloc_noprof+0xd6/0x880 [ 849.966543] ? ext4_find_extent+0x7f5/0xa00 [ 849.966572] ? ext4_es_remove_extent+0x2a7/0x4e0 [ 849.966615] ? ext4_find_extent+0x7f5/0xa00 [ 849.966641] ext4_find_extent+0x7f5/0xa00 [ 849.966673] ? lock_acquire+0x15e/0x2d0 [ 849.966709] ext4_swap_extents+0x213/0x1550 [ 849.966751] ? __pfx_down_write_nested+0x10/0x10 [ 849.966786] ? folio_mapping+0xd8/0x180 [ 849.966825] ext4_move_extents+0x1a11/0x3790 [ 849.966888] ? __lock_acquire+0x451/0x2250 [ 849.966916] ? __pfx_ext4_move_extents+0x10/0x10 [ 849.966944] ? __fget_files+0x34/0x3b0 [ 849.966988] ? lock_acquire+0x15e/0x2d0 [ 849.967014] ? __ext4_ioctl+0x114c/0x38e0 [ 849.967048] ? lock_is_held_type+0x9e/0x120 [ 849.967076] ? mnt_get_write_access_file+0x11f/0x180 [ 849.967121] __ext4_ioctl+0x118f/0x38e0 11:39:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 849.967161] ? __pfx___ext4_ioctl+0x10/0x10 [ 849.967188] ? find_held_lock+0x2b/0x80 [ 849.967224] ? ksys_write+0x121/0x240 [ 849.967261] ? lock_is_held_type+0x9e/0x120 [ 849.967288] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 849.967331] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 849.967362] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 849.967396] ? __mutex_unlock_slowpath+0xc1/0x740 [ 849.967424] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 849.967460] ? print_lock_class_header+0x13f/0x150 [ 849.967485] ? __fget_files+0x34/0x3b0 [ 849.967536] ? find_held_lock+0x2b/0x80 [ 849.967571] ? __fget_files+0x203/0x3b0 [ 849.967608] ? lock_release+0xc8/0x270 [ 849.967645] ? selinux_file_ioctl+0xb9/0x280 [ 849.967680] ? __pfx_ext4_ioctl+0x10/0x10 [ 849.967711] __x64_sys_ioctl+0x18f/0x210 [ 849.967747] do_syscall_64+0xbf/0x420 [ 849.967779] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 849.967803] RIP: 0033:0x7f20dfd35b19 [ 849.967821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 849.967843] RSP: 002b:00007f20dd2ab188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 849.967866] RAX: ffffffffffffffda RBX: 00007f20dfe48f60 RCX: 00007f20dfd35b19 [ 849.967882] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 849.967896] RBP: 00007f20dd2ab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 849.967910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 849.967924] R13: 00007ffcdb064abf R14: 00007f20dd2ab300 R15: 0000000000022000 [ 849.967960] 11:39:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 12) 11:39:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 11) 11:39:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 850.233593] FAULT_INJECTION: forcing a failure. [ 850.233593] name failslab, interval 1, probability 0, space 0, times 0 [ 850.235549] CPU: 0 UID: 0 PID: 7792 Comm: syz-executor.3 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 850.235596] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.235616] Call Trace: [ 850.235627] [ 850.235640] dump_stack_lvl+0xfa/0x120 11:39:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 850.235689] should_fail_ex+0x4d7/0x5e0 [ 850.235746] should_failslab+0xc2/0x120 [ 850.235783] __kmalloc_noprof+0xd6/0x880 [ 850.235831] ? ext4_find_extent+0x7f5/0xa00 [ 850.235885] ? ext4_find_extent+0x7f5/0xa00 [ 850.235921] ext4_find_extent+0x7f5/0xa00 [ 850.235946] ? lock_acquire+0x15e/0x2d0 [ 850.235979] ext4_swap_extents+0x24c/0x1550 [ 850.236018] ? __pfx_down_write_nested+0x10/0x10 [ 850.236050] ? folio_mapping+0xd8/0x180 [ 850.236086] ext4_move_extents+0x1a11/0x3790 [ 850.236144] ? __lock_acquire+0x451/0x2250 [ 850.236169] ? __pfx_ext4_move_extents+0x10/0x10 [ 850.236194] ? __fget_files+0x34/0x3b0 [ 850.236235] ? lock_acquire+0x15e/0x2d0 [ 850.236259] ? __ext4_ioctl+0x114c/0x38e0 [ 850.236291] ? lock_is_held_type+0x9e/0x120 [ 850.236317] ? mnt_get_write_access_file+0x11f/0x180 [ 850.236359] __ext4_ioctl+0x118f/0x38e0 [ 850.236396] ? __pfx___ext4_ioctl+0x10/0x10 [ 850.236429] ? find_held_lock+0x2b/0x80 [ 850.236462] ? ksys_write+0x121/0x240 [ 850.236497] ? lock_is_held_type+0x9e/0x120 [ 850.236522] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 850.236562] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 850.236591] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 850.236623] ? __mutex_unlock_slowpath+0xc1/0x740 [ 850.236649] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 850.236683] ? print_lock_class_header+0x13f/0x150 [ 850.236706] ? __fget_files+0x34/0x3b0 [ 850.236740] ? find_held_lock+0x2b/0x80 [ 850.236773] ? __fget_files+0x203/0x3b0 [ 850.236807] ? lock_release+0xc8/0x270 [ 850.236842] ? selinux_file_ioctl+0xb9/0x280 [ 850.236874] ? __pfx_ext4_ioctl+0x10/0x10 [ 850.236904] __x64_sys_ioctl+0x18f/0x210 [ 850.236937] do_syscall_64+0xbf/0x420 [ 850.236967] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.236989] RIP: 0033:0x7f322658fb19 [ 850.237006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.237026] RSP: 002b:00007f3223b05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 850.237047] RAX: ffffffffffffffda RBX: 00007f32266a2f60 RCX: 00007f322658fb19 [ 850.237062] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 850.237075] RBP: 00007f3223b051d0 R08: 0000000000000000 R09: 0000000000000000 [ 850.237088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 850.237100] R13: 00007fff020a231f R14: 00007f3223b05300 R15: 0000000000022000 [ 850.237134] [ 850.689702] EXT4-fs warning (device loop2): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 850.689702] [ 850.744255] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 850.744255] 11:39:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 13) 11:39:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 12) 11:39:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e60", 0xb, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:21 executing program 4: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) close_range(r0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/201, 0xc9}, {&(0x7f0000001380)=""/178, 0xb2}, {&(0x7f0000001440)=""/91, 0x5b}, {&(0x7f00000014c0)=""/137, 0x89}, {}, {&(0x7f0000000100)=""/10, 0xa}, {&(0x7f0000001580)=""/76, 0x4c}, {&(0x7f0000001600)=""/6, 0x6}], 0x9) 11:39:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 859.948368] loop2: detected capacity change from 0 to 512 [ 859.960204] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 859.964906] EXT4-fs (loop2): get root inode failed [ 859.966213] EXT4-fs (loop2): mount failed 11:39:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 859.991900] loop6: detected capacity change from 0 to 512 11:39:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e60", 0xb, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 860.082914] FAULT_INJECTION: forcing a failure. [ 860.082914] name failslab, interval 1, probability 0, space 0, times 0 [ 860.084047] CPU: 1 UID: 0 PID: 7822 Comm: syz-executor.1 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 860.084063] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 860.084070] Call Trace: [ 860.084074] [ 860.084079] dump_stack_lvl+0xfa/0x120 [ 860.084100] should_fail_ex+0x4d7/0x5e0 [ 860.084121] should_failslab+0xc2/0x120 [ 860.084134] __kmalloc_noprof+0xd6/0x880 [ 860.084152] ? ext4_find_extent+0x7f5/0xa00 [ 860.084172] ? ext4_find_extent+0x7f5/0xa00 [ 860.084185] ext4_find_extent+0x7f5/0xa00 [ 860.084199] ? lock_acquire+0x15e/0x2d0 [ 860.084218] ext4_swap_extents+0x24c/0x1550 [ 860.084239] ? __pfx_down_write_nested+0x10/0x10 [ 860.084257] ? folio_mapping+0xd8/0x180 [ 860.084277] ext4_move_extents+0x1a11/0x3790 [ 860.084309] ? __lock_acquire+0x451/0x2250 [ 860.084322] ? __pfx_ext4_move_extents+0x10/0x10 [ 860.084336] ? __fget_files+0x34/0x3b0 [ 860.084359] ? lock_acquire+0x15e/0x2d0 [ 860.084372] ? __ext4_ioctl+0x114c/0x38e0 [ 860.084390] ? lock_is_held_type+0x9e/0x120 [ 860.084405] ? mnt_get_write_access_file+0x11f/0x180 [ 860.084433] __ext4_ioctl+0x118f/0x38e0 [ 860.084453] ? __pfx___ext4_ioctl+0x10/0x10 [ 860.084467] ? find_held_lock+0x2b/0x80 [ 860.084485] ? ksys_write+0x121/0x240 [ 860.084505] ? lock_is_held_type+0x9e/0x120 [ 860.084519] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 860.084542] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 860.084558] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 860.084576] ? __mutex_unlock_slowpath+0xc1/0x740 [ 860.084590] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 860.084609] ? print_lock_class_header+0x13f/0x150 [ 860.084621] ? __fget_files+0x34/0x3b0 [ 860.084640] ? find_held_lock+0x2b/0x80 [ 860.084658] ? __fget_files+0x203/0x3b0 [ 860.084676] ? lock_release+0xc8/0x270 [ 860.084695] ? selinux_file_ioctl+0xb9/0x280 [ 860.084712] ? __pfx_ext4_ioctl+0x10/0x10 [ 860.084728] __x64_sys_ioctl+0x18f/0x210 [ 860.084747] do_syscall_64+0xbf/0x420 [ 860.084763] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 860.084776] RIP: 0033:0x7f20dfd35b19 [ 860.084786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 860.084797] RSP: 002b:00007f20dd2ab188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 860.084810] RAX: ffffffffffffffda RBX: 00007f20dfe48f60 RCX: 00007f20dfd35b19 [ 860.084817] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 860.084825] RBP: 00007f20dd2ab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 860.084832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 860.084839] R13: 00007ffcdb064abf R14: 00007f20dd2ab300 R15: 0000000000022000 [ 860.084857] [ 860.087868] loop2: detected capacity change from 0 to 512 11:39:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 13) 11:39:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:21 executing program 4: r0 = syz_io_uring_setup(0xa5, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20000, 0x0) syz_io_uring_setup(0x64cd, &(0x7f0000000280)={0x0, 0x8ab3, 0x0, 0x2, 0x194, 0x0, r2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000300)) close_range(r0, 0xffffffffffffffff, 0x0) [ 860.211747] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 860.220513] EXT4-fs (loop2): get root inode failed [ 860.220898] EXT4-fs (loop2): mount failed 11:39:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 14) 11:39:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e60", 0xb, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) 11:39:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b6e6685895fe3f0c3b6ab096642db480f7659bea604c0f190aa5f0c03c70f91bf659fc5641877c7d7119f5089d9106c6825abe3ce17c3397d6ab831207e51f5a90425e65856619aee7e085aa597444e5341d642ff535f178ad73eba8417e818c6270da28e9d9bd10c2842133b0fe3619250f0b1c4c51ca8da0a9a531604a9d666660d425b952d4e4068d74cc4205622ed3003a5909a8913c78ec6a071632f4195bd997d2cfb7b926b26f953f4d32ea74e19f807f7a93ea0dc9eb4277b76052a3a90e9cdb1918ef54d93bb3830a601974de934537a310dc6c340827c6b056f579d0747c237820d944cb858456f49e2cf5d96078b240aa264a835a2805e3d64773a55c989cf8b560515f1d2fc8969a57b46726d553f69f407d16ec8e9d71c23efba94ee7f762bf036f05dd66c75d00d6b9df3136f45", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) [ 860.371148] loop2: detected capacity change from 0 to 512 11:39:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 860.411491] EXT4-fs error (device loop2): __ext4_fill_super:5553: inode #2: comm syz-executor.2: iget: bad i_size value: -6820241459971618816 [ 860.422904] EXT4-fs (loop2): get root inode failed [ 860.423755] EXT4-fs (loop2): mount failed [ 860.797388] EXT4-fs warning (device loop6): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 860.797388] 11:39:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 14) 11:39:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff", 0x8}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 11:39:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a17d4b", 0x72, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) (fail_nth: 15) 11:39:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:30 executing program 4: r0 = syz_io_uring_setup(0x16edd, &(0x7f0000000080)={0x0, 0xf10d, 0x0, 0x3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000100)) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000180)=""/230, 0xe6) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80100) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000280)={0x0, "d20a2c01514e6befc754cd28b9b79720"}) 11:39:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 869.672627] loop6: detected capacity change from 0 to 512 [ 869.680145] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 [ 869.700581] loop2: detected capacity change from 0 to 512 11:39:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff223e6055fad68709f88497f932819acc8f3cccf005f4be01637a35edce2000f231bbd6b539b94f4b8d4f5c64c3301414c764d47d620f3adecf5b5fd417e3774a3e268609af3bfbd10c5b95cc923fe5379bb7101d5cf251b406f1924f2ada1281ddbe96c2eaeb25d52791d7b95146cf3cd76edd99b93487eed6c66670724739514a84e6bfb9d555", 0x8f, 0x6000}, {&(0x7f00000004c0)="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", 0x1a6, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000400)="504d4d00504d4dff", 0x8}, {&(0x7f00000004c0)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008f57810000ef0b85e2c476bdf570d1e0087f87178d9616a6e7cd58e046bc58925d62c919db38bc1e2e2f94dab7968f16ba5cff679ccaf1534bcd0323a0df20db53762f956eb911d265a92cabb28b7c511c8b74e187a259a1", 0x70, 0x11080}], 0x400000, &(0x7f0000013c00)=ANY=[]) 11:39:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 11:39:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1814c2, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)=' ', 0x1, 0x99ad) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2}) [ 869.798430] FAULT_INJECTION: forcing a failure. [ 869.798430] name failslab, interval 1, probability 0, space 0, times 0 [ 869.799525] CPU: 1 UID: 0 PID: 7884 Comm: syz-executor.3 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 869.799541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 869.799549] Call Trace: [ 869.799553] [ 869.799558] dump_stack_lvl+0xfa/0x120 [ 869.799579] should_fail_ex+0x4d7/0x5e0 [ 869.799600] should_failslab+0xc2/0x120 [ 869.799613] __kmalloc_noprof+0xd6/0x880 [ 869.799628] ? __pfx_perf_trace_lock+0x10/0x10 [ 869.799646] ? ext4_find_extent+0x7f5/0xa00 [ 869.799671] ? ext4_find_extent+0x7f5/0xa00 [ 869.799685] ext4_find_extent+0x7f5/0xa00 [ 869.799700] ? lock_release+0xc8/0x270 [ 869.799716] ext4_ext_map_blocks+0x1cc/0x6050 [ 869.799821] ? unwind_get_return_address+0x59/0xa0 [ 869.799870] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 869.799904] ? arch_stack_walk+0x9c/0xf0 [ 869.799938] ? perf_trace_lock+0xb5/0x5d0 [ 869.799965] ? __lock_acquire+0x451/0x2250 [ 869.799999] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 869.800031] ? __lock_acquire+0x451/0x2250 [ 869.800063] ? __pfx_perf_trace_lock+0x10/0x10 [ 869.800099] ? lock_acquire+0x15e/0x2d0 [ 869.800132] ? __lock_acquire+0x451/0x2250 [ 869.800158] ? __mutex_add_waiter+0x1e1/0x210 [ 869.800199] ? lock_acquire+0x15e/0x2d0 [ 869.800225] ? ext4_map_blocks+0x4a8/0x1470 [ 869.800269] ext4_map_query_blocks+0x110/0x900 [ 869.800308] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 869.800339] ? do_raw_read_unlock+0x44/0xe0 [ 869.800372] ? __pfx_down_read+0x10/0x10 [ 869.800402] ? ext4_es_lookup_extent+0xcd/0xb50 [ 869.800462] ext4_map_blocks+0x4bc/0x1470 [ 869.800505] ? __memcg_slab_post_alloc_hook+0x4a5/0x970 [ 869.800544] ? __pfx_ext4_map_blocks+0x10/0x10 [ 869.800587] ? perf_trace_lock+0xb5/0x5d0 [ 869.800613] ? __lock_acquire+0x451/0x2250 [ 869.800645] ? __pfx_perf_trace_lock+0x10/0x10 [ 869.800686] _ext4_get_block+0x214/0x560 [ 869.800725] ? __pfx__ext4_get_block+0x10/0x10 [ 869.800759] ? lock_release+0xc8/0x270 [ 869.800787] ? do_raw_spin_unlock+0x53/0x220 [ 869.800820] ? _raw_spin_unlock+0x1e/0x40 [ 869.800857] ? create_empty_buffers+0x219/0x460 [ 869.800887] ext4_move_extents+0x1bf3/0x3790 [ 869.800950] ? __lock_acquire+0x451/0x2250 [ 869.800977] ? __pfx_ext4_move_extents+0x10/0x10 [ 869.801005] ? __fget_files+0x34/0x3b0 [ 869.801048] ? lock_acquire+0x15e/0x2d0 [ 869.801074] ? __ext4_ioctl+0x114c/0x38e0 [ 869.801109] ? lock_is_held_type+0x9e/0x120 [ 869.801137] ? mnt_get_write_access_file+0x11f/0x180 [ 869.801182] __ext4_ioctl+0x118f/0x38e0 [ 869.801223] ? __pfx___ext4_ioctl+0x10/0x10 [ 869.801250] ? find_held_lock+0x2b/0x80 [ 869.801285] ? ksys_write+0x121/0x240 [ 869.801325] ? lock_is_held_type+0x9e/0x120 [ 869.801353] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 869.801396] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 869.801426] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 869.801461] ? __mutex_unlock_slowpath+0xc1/0x740 [ 869.801490] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 869.801526] ? print_lock_class_header+0x13f/0x150 [ 869.801552] ? __fget_files+0x34/0x3b0 [ 869.801588] ? find_held_lock+0x2b/0x80 [ 869.801622] ? __fget_files+0x203/0x3b0 [ 869.801658] ? lock_release+0xc8/0x270 [ 869.801697] ? selinux_file_ioctl+0xb9/0x280 [ 869.801731] ? __pfx_ext4_ioctl+0x10/0x10 [ 869.801763] __x64_sys_ioctl+0x18f/0x210 [ 869.801800] do_syscall_64+0xbf/0x420 [ 869.801834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 869.801859] RIP: 0033:0x7f322658fb19 [ 869.801882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 869.801906] RSP: 002b:00007f3223b05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 869.801930] RAX: ffffffffffffffda RBX: 00007f32266a2f60 RCX: 00007f322658fb19 [ 869.801946] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 869.801961] RBP: 00007f3223b051d0 R08: 0000000000000000 R09: 0000000000000000 [ 869.801975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 869.801989] R13: 00007fff020a231f R14: 00007f3223b05300 R15: 0000000000022000 [ 869.802027] [ 869.859001] ------------[ cut here ]------------ [ 869.860062] kernel BUG at fs/ext4/extents.c:5714! [ 869.860835] Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI [ 869.861653] CPU: 1 UID: 0 PID: 7884 Comm: syz-executor.3 Not tainted 6.18.0-next-20251205 #1 PREEMPT(voluntary) [ 869.863110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 869.864293] RIP: 0010:ext4_swap_extents+0x9ce/0x1550 [ 869.865030] Code: 00 00 00 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 15 0a 00 00 48 8b 84 24 c8 00 00 00 89 18 e9 ff fc ff ff e8 a3 38 8c ff 90 <0f> 0b e8 9b 38 8c ff 90 0f 0b e8 93 38 8c ff 48 8b 44 24 58 48 c1 [ 869.867612] RSP: 0018:ffff8880490078f8 EFLAGS: 00010216 [ 869.869637] RAX: 00000000000282d9 RBX: 0000000000000000 RCX: ffffc9000704d000 [ 869.871754] RDX: 0000000000040000 RSI: ffffffff81e97c1d RDI: 0000000000000007 [ 869.873819] RBP: ffff888048a4d7c8 R08: 0000000000000000 R09: ffffed1009149af9 [ 869.876105] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 869.878136] R13: 00000000fffffff4 R14: ffffea00012f1e40 R15: 000000000000000a [ 869.879889] FS: 00007f3223b05700(0000) GS:ffff8880e545c000(0000) knlGS:0000000000000000 [ 869.881076] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 869.881936] CR2: 00005555841a7708 CR3: 000000001f7a8000 CR4: 0000000000350ef0 [ 869.882985] Call Trace: [ 869.883371] [ 869.883728] ? __pfx__ext4_get_block+0x10/0x10 [ 869.884426] ? do_raw_spin_unlock+0x53/0x220 [ 869.885093] ? _raw_spin_unlock+0x1e/0x40 [ 869.885726] ext4_move_extents+0x3197/0x3790 [ 869.886398] ? __lock_acquire+0x451/0x2250 [ 869.887026] ? __pfx_ext4_move_extents+0x10/0x10 [ 869.887738] ? __fget_files+0x34/0x3b0 [ 869.888331] ? lock_acquire+0x15e/0x2d0 [ 869.888927] ? __ext4_ioctl+0x114c/0x38e0 [ 869.889547] ? lock_is_held_type+0x9e/0x120 [ 869.890184] ? mnt_get_write_access_file+0x11f/0x180 [ 869.890945] __ext4_ioctl+0x118f/0x38e0 [ 869.891548] ? __pfx___ext4_ioctl+0x10/0x10 [ 869.892198] ? find_held_lock+0x2b/0x80 [ 869.892801] ? ksys_write+0x121/0x240 [ 869.893381] ? lock_is_held_type+0x9e/0x120 [ 869.894029] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 869.894801] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 869.895448] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 869.896312] ? __mutex_unlock_slowpath+0xc1/0x740 [ 869.897034] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 869.897944] ? print_lock_class_header+0x13f/0x150 [ 869.898673] ? __fget_files+0x34/0x3b0 [ 869.899268] ? find_held_lock+0x2b/0x80 [ 869.899882] ? __fget_files+0x203/0x3b0 [ 869.900485] ? lock_release+0xc8/0x270 [ 869.901071] ? selinux_file_ioctl+0xb9/0x280 [ 869.901739] ? __pfx_ext4_ioctl+0x10/0x10 [ 869.902360] __x64_sys_ioctl+0x18f/0x210 [ 869.902973] do_syscall_64+0xbf/0x420 [ 869.903548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 869.904311] RIP: 0033:0x7f322658fb19 [ 869.904863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 869.907510] RSP: 002b:00007f3223b05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 869.908588] RAX: ffffffffffffffda RBX: 00007f32266a2f60 RCX: 00007f322658fb19 [ 869.909600] RDX: 00000000200000c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 869.910620] RBP: 00007f3223b051d0 R08: 0000000000000000 R09: 0000000000000000 [ 869.911633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 869.912656] R13: 00007fff020a231f R14: 00007f3223b05300 R15: 0000000000022000 [ 869.913684] [ 869.914035] Modules linked in: [ 869.915718] ---[ end trace 0000000000000000 ]--- [ 869.917199] RIP: 0010:ext4_swap_extents+0x9ce/0x1550 [ 869.918019] Code: 00 00 00 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 15 0a 00 00 48 8b 84 24 c8 00 00 00 89 18 e9 ff fc ff ff e8 a3 38 8c ff 90 <0f> 0b e8 9b 38 8c ff 90 0f 0b e8 93 38 8c ff 48 8b 44 24 58 48 c1 [ 869.920666] RSP: 0018:ffff8880490078f8 EFLAGS: 00010216 [ 869.921483] RAX: 00000000000282d9 RBX: 0000000000000000 RCX: ffffc9000704d000 [ 869.922530] RDX: 0000000000040000 RSI: ffffffff81e97c1d RDI: 0000000000000007 [ 869.923580] RBP: ffff888048a4d7c8 R08: 0000000000000000 R09: ffffed1009149af9 [ 869.924648] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 869.925702] R13: 00000000fffffff4 R14: ffffea00012f1e40 R15: 000000000000000a [ 869.926764] FS: 00007f3223b05700(0000) GS:ffff8880e545c000(0000) knlGS:0000000000000000 [ 869.927968] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 869.928850] CR2: 00005555841a7708 CR3: 000000001f7a8000 CR4: 0000000000350ef0 [ 869.961149] loop6: detected capacity change from 0 to 512 [ 869.971296] EXT4-fs warning (device loop6): read_mmp_block:110: Error -117 while reading MMP block 12 [ 872.653624] EXT4-fs warning (device loop2): ext4_multi_mount_protect:328: MMP startup interrupted, failing mount [ 872.653624] VM DIAGNOSIS: 11:39:31 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000045f26 RCX=ffffffff819f9794 RDX=ffff888015f38000 RSI=ffffffff819f97a2 RDI=0000000000000005 RBP=1ffff110031f0ea0 RSP=ffff888018f87500 R8 =8000000045f26007 R9 =00007fbae178c000 R10=0000000000000000 R11=00000000000001ff R12=8000000045f26007 R13=ffff88801c8ddb40 R14=00007fbae178c000 R15=0000000000000000 RIP=ffffffff819f97a2 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555593fcd400 00000000 00000000 GS =0000 ffff8880e535c000 00000000 00000000 LDT=0000 fffffe1900000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f76808d9330 CR3=000000000f0a4000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=25252525252525252525252525252525 XMM01=00000000000000ff0000000000ff0000 XMM02=00000000000000ff0000000000ff0000 XMM03=696e656420737365636341002f737973 XMM04=000056415e3e8090000056415e3e8070 XMM05=000000ff000101000000000000000000 XMM06=0000000000000005000056415e3e80c0 XMM07=00000000000000000000000000000000 XMM08=732f636f72702f006b63616d7300632e XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000066 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff82965035 RDI=ffffffff889a7b40 RBP=ffffffff889a7b00 RSP=ffff888049007200 R8 =0000000000000000 R9 =ffffed10016c3046 R10=0000000000000066 R11=6165666666662052 R12=0000000000000066 R13=0000000000000010 R14=ffffffff889a7b00 R15=ffffffff82965020 RIP=ffffffff8296508d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f3223b05700 00000000 00000000 GS =0000 ffff8880e545c000 00000000 00000000 LDT=0000 fffffe1600000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005555841a7708 CR3=000000001f7a8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ff00000000ff000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000