000012a00)) (fail_nth: 93) [ 3095.797241] loop1: detected capacity change from 0 to 1024 [ 3095.804409] loop0: detected capacity change from 0 to 1056 15:42:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000016c, 0x0, 0x0, 0x0) [ 3095.831471] loop5: detected capacity change from 0 to 4 [ 3095.843775] EXT4-fs (loop5): unsupported descriptor size 0 15:42:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:42:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) (fail_nth: 94) 15:42:22 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="03c9009bc2301da5ff9150c5f6bf21f922e1bd6981f09e76e2fde4fa06652f54c641cb2bcd5173d07d4e61232ab4bcad341e79ac04fbcacd83884c718903fe8368588a40bfbe3f3e35cb79d3ce7d9afecc2c554d22e6ba1073b5627ae24f8b574a7514ab50875b6b92736bbcb76bee493d2cc81fc2199dc5ab8e5197cc001764553c45a27545c6a8f473021e670d0fce2db2ede7913a2aae1bb941fdbb20ad9e33ad96cf7b69a35e64a51297250fc165362d9de1557cf5faa4ad2f1c72479bf315bfc0006fdccb9470772efcb3cebe286f955415de34fe3c930c4c31b32e48781784842ff06b30d70366e136b0eb786c09c3a96f3fe7a41e767f550dc83ee5589b3c268945f42d027f5e011926c4165104664229cac78f013f372092b12ff4c3345b0168cb148a0e9636b71e947b1dc132328d0ae9a4d0ac1fa83df77368b709703c7892a45f48c20ef148e6a8f5747024b03dea6eb3804c7d376784b947a02ef48b0ec965af260b9f58b9c8a792a819f36d4eea0e79e849142140dfe705cb3c09747fdff4333dc713245743a34c80e1b68fea4fff4825152378e1906e443dc134449e9e358c7db3663fdebadd1b4f89ef3c0d29c8a0495091e7d3311cbb310db7b43c8176b8175071983a26607d793fc914c034f0493ee6c5318bcf4a92e39d54300511edb91241e4ebd8d04a0ebc5730e5414ae9ddb0248fe12261f32d4e0f27230398b28d8d195e667e5885c6aa"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYRESDEC], 0xfffffffffffffe5c) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000280)=ANY=[@ANYRESHEX], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) [ 3095.940668] loop5: detected capacity change from 0 to 4 [ 3095.946793] FAULT_INJECTION: forcing a failure. [ 3095.946793] name failslab, interval 1, probability 0, space 0, times 0 [ 3095.947779] CPU: 1 UID: 0 PID: 79744 Comm: syz-executor.5 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3095.947796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3095.947805] Call Trace: [ 3095.947809] [ 3095.947814] dump_stack_lvl+0xfa/0x120 [ 3095.947841] should_fail_ex+0x4d7/0x5e0 [ 3095.947866] should_failslab+0xc2/0x120 [ 3095.947879] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 3095.947901] ? vfs_parse_fs_qstr+0x112/0x1c0 [ 3095.947923] kmemdup_nul+0x3b/0xa0 [ 3095.947937] vfs_parse_fs_qstr+0x112/0x1c0 [ 3095.947954] ? trace_kmalloc+0x1f/0xb0 [ 3095.947974] ? __pfx_vfs_parse_fs_qstr+0x10/0x10 [ 3095.947999] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 3095.948017] vfs_parse_monolithic_sep+0x198/0x220 [ 3095.948037] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 3095.948056] ? alloc_fs_context+0x5c0/0x9e0 [ 3095.948078] path_mount+0x6d6/0x2140 [ 3095.948091] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3095.948114] ? __pfx_path_mount+0x10/0x10 [ 3095.948124] ? kmem_cache_free+0x2a4/0x540 [ 3095.948142] ? getname_flags.part.0+0x1c6/0x540 [ 3095.948159] ? putname.part.0+0xc0/0x160 [ 3095.948175] __x64_sys_mount+0x293/0x310 [ 3095.948186] ? __pfx___x64_sys_mount+0x10/0x10 [ 3095.948202] do_syscall_64+0xbf/0x430 [ 3095.948221] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3095.948234] RIP: 0033:0x7f0af432604a [ 3095.948244] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3095.948256] RSP: 002b:00007f0af1899fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3095.948269] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0af432604a [ 3095.948277] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0af189a000 [ 3095.948286] RBP: 00007f0af189a040 R08: 00007f0af189a040 R09: 0000000020000000 [ 3095.948294] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 3095.948301] R13: 0000000020000100 R14: 00007f0af189a000 R15: 0000000020012a00 [ 3095.948317] [ 3096.619908] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3096.619908] [ 3096.630522] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3096.630522] 15:42:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) (fail_nth: 95) 15:42:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000016d, 0x0, 0x0, 0x0) 15:42:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:42:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:42:34 executing program 6: clock_nanosleep(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0) r2 = dup2(r0, r1) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x13, r2, 0x0) syz_io_uring_submit(r3, 0x0, 0xfffffffffffffffe, 0x0) syz_io_uring_setup(0x58eb, &(0x7f0000000000)={0x0, 0x7a02, 0x0, 0x1, 0xd0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000100)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xed9f8b86c8af1979}, 0x1000) 15:42:34 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="02c8300a0081020003000000000000"], 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="040f0404001104a8f502c7f56d7b64e8a8de75506f54588e80ba24a23f7c4f6af9aae09bb6ee1c57875aef328ca137ee37f43c9094fc209f4aa96f25caf67c31735e937faf989706d790332b05fb24ccea7e1b4a268c1a95efcf9a06097204c3d16ca08530b6d73f98b2734c1d2ee90cab81193ab5e117f85ded2403fa970c5f867c5f02457cb4f25ecc64299a320843ced0eb76f5296304417a9055b0f872d9ee733e47e9d7a2279e1649ea2c1baf9f2beb1a87759347e1c01c22d3fe8b7a87c5907d4d5df0ec3f47fce67f11241c4ec384afa6bf7bf297e050c869a25c6ac143999e0f2d77f5a1a96f926f62c3442f5872b7b0184c6ef1cf2dd1e7ec53fae4aa77bb6015e94bd0722955c5531ea54c3c8cc874076cf67162f4fa24b27bc400b48244fb0cd563f5f4c270a7409e7feba12ca6702644b1651662c795fc14d81edc0cbdee43367316dede18d0096fa844f20d39de22f33b181b2efe192530c81a9fa2c423c6feafe09f885ef46115d85e46b8b7efdb3157932e23d619d3be81588bc9d04daa6c55c4331dd8a62882da5e066f32ff817c070a2fe7e521d8fbcf7f437500273487dd225b3ca5d6feba9890e5fabd"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000280)={0xadb, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:42:34 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:42:34 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) [ 3108.177052] loop0: detected capacity change from 0 to 1057 [ 3108.179803] loop1: detected capacity change from 0 to 1024 [ 3108.192383] loop5: detected capacity change from 0 to 4 [ 3108.196468] FAULT_INJECTION: forcing a failure. [ 3108.196468] name failslab, interval 1, probability 0, space 0, times 0 [ 3108.197866] CPU: 1 UID: 0 PID: 79799 Comm: syz-executor.5 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3108.197889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3108.197899] Call Trace: [ 3108.197905] [ 3108.197911] dump_stack_lvl+0xfa/0x120 [ 3108.197943] should_fail_ex+0x4d7/0x5e0 [ 3108.197975] should_failslab+0xc2/0x120 [ 3108.197991] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 3108.198019] ? vfs_parse_fs_qstr+0x112/0x1c0 [ 3108.198049] kmemdup_nul+0x3b/0xa0 [ 3108.198067] vfs_parse_fs_qstr+0x112/0x1c0 [ 3108.198090] ? trace_kmalloc+0x1f/0xb0 [ 3108.198117] ? __pfx_vfs_parse_fs_qstr+0x10/0x10 [ 3108.198151] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 3108.198175] vfs_parse_monolithic_sep+0x198/0x220 [ 3108.198202] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 3108.198229] ? alloc_fs_context+0x5c0/0x9e0 [ 3108.198258] path_mount+0x6d6/0x2140 [ 3108.198274] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3108.198304] ? __pfx_path_mount+0x10/0x10 [ 3108.198319] ? kmem_cache_free+0x2a4/0x540 [ 3108.198342] ? getname_flags.part.0+0x1c6/0x540 [ 3108.198365] ? putname.part.0+0xc0/0x160 [ 3108.198386] __x64_sys_mount+0x293/0x310 [ 3108.198402] ? __pfx___x64_sys_mount+0x10/0x10 [ 3108.198423] do_syscall_64+0xbf/0x430 [ 3108.198447] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3108.198465] RIP: 0033:0x7f0af432604a [ 3108.198477] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3108.198498] RSP: 002b:00007f0af1899fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3108.198514] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0af432604a [ 3108.198525] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0af189a000 [ 3108.198535] RBP: 00007f0af189a040 R08: 00007f0af189a040 R09: 0000000020000000 [ 3108.198546] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 3108.198556] R13: 0000000020000100 R14: 00007f0af189a000 R15: 0000000020012a00 [ 3108.198577] 15:42:34 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:42:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000016e, 0x0, 0x0, 0x0) 15:42:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) (fail_nth: 96) 15:42:34 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none}, 0xe) 15:42:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000016f, 0x0, 0x0, 0x0) 15:42:34 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="040f0404001104a8f502c7f56d7b64e8a8de75506f54588e80ba24a23f7c4f6af9aae09bb6ee1c57875aef328ca137ee37f43c9094fc209f4aa96f25caf67c31735e937faf989706d7907a36f7eb24ccea7e1b4a268c1a95efcf9a06097204c3d16ca08530b6d73f98b2734c1d2ee90cab81193ab5e117f85ded2403fa970c5f867c5f02457cb4f25ecc64299a320843ced0eb76f5296304417a9055b0f872d9ee733e47e9d7a2279e1649ea2c1baf9f2beb1a87759347e1c01c22d3fe8b7a87c5907d4d5df0ec3f47fce67f11241c4ec384afa6bf7bf297e050c869a25c6ac143999e0f2d77f56ef1cf2dd1e7ec53fae4aa77bb6015e94bd0722955c5531ea54c3c8cc874076cf67162f4fa24b27bc400b48244fb0cd563f5f4c270a7409e7feba12ca6702644b1651662c795fc14d81edc0cbdee43367316dede18d0096fa844f20d39de22f33b181b2efe192530c81a9fa2c423c6feafe09f885ef46115d85e46b8b7efdb3157932e23d619d3be81588bc9d04daa6c55c4331dd8a62882da5e066f32ff817c070a2fe7e521d8fbcf7f437500273487dd225b3ca5d4feba9890e5fabd02ef90c3b8404ec717d0ea92b9ddae"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:42:34 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3108.411630] loop5: detected capacity change from 0 to 4 [ 3108.421002] FAULT_INJECTION: forcing a failure. [ 3108.421002] name failslab, interval 1, probability 0, space 0, times 0 [ 3108.422836] CPU: 0 UID: 0 PID: 80017 Comm: syz-executor.5 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3108.422867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3108.422880] Call Trace: [ 3108.422887] [ 3108.422896] dump_stack_lvl+0xfa/0x120 [ 3108.422936] should_fail_ex+0x4d7/0x5e0 [ 3108.422978] ? getname_kernel+0x52/0x390 [ 3108.423001] should_failslab+0xc2/0x120 [ 3108.423023] kmem_cache_alloc_noprof+0x80/0x690 [ 3108.423051] ? avc_has_perm_noaudit+0x59/0x3d0 [ 3108.423079] ? find_held_lock+0x2b/0x80 [ 3108.423109] ? getname_kernel+0x52/0x390 [ 3108.423133] getname_kernel+0x52/0x390 [ 3108.423159] kern_path+0x1f/0x80 [ 3108.423194] lookup_bdev+0xc6/0x270 [ 3108.423222] ? __pfx_lookup_bdev+0x10/0x10 [ 3108.423250] ? __pfx_cred_has_capability.isra.0+0x10/0x10 [ 3108.423292] get_tree_bdev_flags+0xb8/0x620 [ 3108.423326] ? __pfx_ext4_fill_super+0x10/0x10 [ 3108.423363] ? __pfx_get_tree_bdev_flags+0x10/0x10 [ 3108.423398] ? cap_capable+0x9c/0x240 [ 3108.423436] ? security_capable+0x2f/0x90 [ 3108.423472] vfs_get_tree+0x93/0x340 15:42:34 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none}, 0xe) [ 3108.423511] path_mount+0x726/0x2140 [ 3108.423533] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3108.423574] ? __pfx_path_mount+0x10/0x10 [ 3108.423599] ? getname_flags.part.0+0x1c6/0x540 [ 3108.423629] ? putname.part.0+0xc0/0x160 [ 3108.423657] __x64_sys_mount+0x293/0x310 [ 3108.423680] ? __pfx___x64_sys_mount+0x10/0x10 [ 3108.423710] do_syscall_64+0xbf/0x430 [ 3108.423744] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3108.423767] RIP: 0033:0x7f0af432604a [ 3108.423784] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3108.423805] RSP: 002b:00007f0af1899fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3108.423827] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0af432604a [ 3108.423842] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0af189a000 [ 3108.423855] RBP: 00007f0af189a040 R08: 00007f0af189a040 R09: 0000000020000000 [ 3108.423869] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 3108.423883] R13: 0000000020000100 R14: 00007f0af189a000 R15: 0000000020012a00 [ 3108.423912] [ 3108.454084] /dev/loop5: Can't lookup blockdev [ 3108.999881] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3108.999881] [ 3109.004103] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3109.004103] 15:42:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x86000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:42:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:42:44 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000170, 0x0, 0x0, 0x0) 15:42:44 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:42:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) (fail_nth: 97) 15:42:44 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none}, 0xe) 15:42:44 executing program 6: clock_nanosleep(0x4, 0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x810, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x6fb6, &(0x7f0000000000)={0x0, 0xb953, 0x0, 0x0, 0x1ac}, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000000000)={0x0, @xdp={0x2c, 0x0, 0x0, 0x34}, @in={0x2, 0x4e24, @empty}, @llc={0x1a, 0xffff, 0x1, 0xff, 0x0, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x10000000007f, 0x2}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x3}}, 0x0, r5}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', r5, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback, 0x0, 0x20}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000740)=0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000c80)=ANY=[@ANYBLOB="dc0100001800000125bd7000fedbdf25000000000000000000000000000000000a0101020000000000000000000000004e2404014e2300000000000000000012005232c5631a1d434f42f8ca6687aacaf5d7eb630080743b56b9bf4c6651c3acf892efcc9e6878d11a5d78000000226f3d17103ea23501b5dad13754c00ea648501359a29af75a551c5e3b60b89ad6ac95000000000000000000000000000000006dff4b89cf9b535ed03b96c561f21cd6086e7b5afc211e1e6c227c79e50ef42b9eab243308444b698acab9572ddcb382e41280", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0a010100000000000000000000000000000004d33300000064010100000000000000000000000000c5ffffffffffffff05000000000000000104000000000000210000000000000000000000000000004000000000000000030000000000000000fcffffffffffff0104000000000000d10200000000000009000000000000000800000000000000000800bb0200000002000027bd70000740bf49916e7bb313eb5f1b3500000a0006060200000000000000b500000000000000e4000600fe800000000000000000000000000037000000000000000000000000000000004e20009b4e23", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="ac1414aa000000000000000000000000000004d46c00000000000000000000000000000000000000dd0e0000000000004d0000000000000000010000000000000200000000000000060000000000000005000000000000010000000000000000000005000000000000005f9300000000000008000000000000002000000007000000500f000028bd700007350000060002d64700"/168], 0x1dc}, 0x1, 0x0, 0x0, 0x4000011}, 0x40084) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)=@ll={0x11, 0xf5, r5, 0x1, 0x4, 0x6, @random="d8f4d14d8f2d"}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000200)="f367f041c470da6da401aca4a15f7894e27eba90d9e338f4d5f3c06f888f264896603bdb69b8", 0x26}], 0x1, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], 0x3d0}, 0x0, 0x8000000, 0x1, {0x0, r7}}, 0x6) syz_io_uring_submit(0x0, r1, &(0x7f0000000100)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index, 0x3f, 0x0, 0x0, 0x0, 0x1, {0x0, r7}}, 0x3f) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r8, 0x6, {}, 0x401, 0x9}, 0x6) 15:42:44 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f0000000280)=ANY=[@ANYBLOB="02e53d0151c5fa603fa4a70dc8002a8cecdad5f0e40775a95253b6180014c5d3df86bb3299b37620"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:42:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000016a, 0x0, 0x0, 0x0) [ 3118.797598] loop0: detected capacity change from 0 to 1072 [ 3118.832164] loop5: detected capacity change from 0 to 4 [ 3118.837706] loop1: detected capacity change from 0 to 1024 [ 3118.852300] EXT4-fs (loop5): unsupported descriptor size 0 15:42:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000171, 0x0, 0x0, 0x0) 15:42:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400), 0x0, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:42:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) (fail_nth: 98) [ 3118.917097] loop4: detected capacity change from 0 to 1024 15:42:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000172, 0x0, 0x0, 0x0) 15:42:45 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000840)=ANY=[@ANYRES32, @ANYRESOCT, @ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)=0x1) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:42:45 executing program 6: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r3) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c213ff72fdd86bd7cfac062ec047b73f200ff", @ANYRES16=r4, @ANYBLOB="10002abd7000fedbdf2503000000080005007f000001"], 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) [ 3118.955279] EXT4-fs warning (device loop4): read_mmp_block:114: Error -117 while reading MMP block 64 [ 3118.991143] loop5: detected capacity change from 0 to 4 [ 3118.995852] FAULT_INJECTION: forcing a failure. [ 3118.995852] name failslab, interval 1, probability 0, space 0, times 0 [ 3118.996849] CPU: 1 UID: 0 PID: 80463 Comm: syz-executor.5 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3118.996867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3118.996875] Call Trace: [ 3118.996879] [ 3118.996887] dump_stack_lvl+0xfa/0x120 [ 3118.996920] should_fail_ex+0x4d7/0x5e0 [ 3118.996946] should_failslab+0xc2/0x120 [ 3118.996960] __kmalloc_cache_noprof+0x81/0x6b0 [ 3118.996978] ? __pfx_mntput_no_expire+0x10/0x10 [ 3118.996997] ? alloc_super+0x53/0xb50 [ 3118.997019] ? alloc_super+0x53/0xb50 [ 3118.997035] ? __pfx_super_s_dev_test+0x10/0x10 [ 3118.997049] alloc_super+0x53/0xb50 [ 3118.997066] ? lock_release+0xc8/0x290 [ 3118.997088] ? __pfx_super_s_dev_test+0x10/0x10 [ 3118.997102] sget_fc+0xfe/0xb80 [ 3118.997120] ? __pfx_super_s_dev_set+0x10/0x10 [ 3118.997137] get_tree_bdev_flags+0x1b8/0x620 [ 3118.997154] ? __pfx_ext4_fill_super+0x10/0x10 [ 3118.997174] ? __pfx_get_tree_bdev_flags+0x10/0x10 [ 3118.997193] ? cap_capable+0x9c/0x240 [ 3118.997213] ? security_capable+0x2f/0x90 [ 3118.997233] vfs_get_tree+0x93/0x340 [ 3118.997249] path_mount+0x726/0x2140 [ 3118.997261] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3118.997285] ? __pfx_path_mount+0x10/0x10 [ 3118.997298] ? getname_flags.part.0+0x1c6/0x540 [ 3118.997315] ? putname.part.0+0xc0/0x160 [ 3118.997331] __x64_sys_mount+0x293/0x310 [ 3118.997343] ? __pfx___x64_sys_mount+0x10/0x10 [ 3118.997359] do_syscall_64+0xbf/0x430 [ 3118.997377] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3118.997391] RIP: 0033:0x7f0af432604a [ 3118.997400] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3118.997412] RSP: 002b:00007f0af1899fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3118.997425] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0af432604a [ 3118.997433] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0af189a000 [ 3118.997441] RBP: 00007f0af189a040 R08: 00007f0af189a040 R09: 0000000020000000 [ 3118.997449] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 3118.997457] R13: 0000000020000100 R14: 00007f0af189a000 R15: 0000000020012a00 [ 3118.997473] [ 3119.630696] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3119.630696] [ 3119.664447] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3119.664447] 15:42:54 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000173, 0x0, 0x0, 0x0) 15:42:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:42:54 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:42:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x89601, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:42:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:42:54 executing program 6: clock_nanosleep(0xe20d61d1f276a7b7, 0x0, 0x0, 0x0) 15:42:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) (fail_nth: 99) 15:42:54 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000280)=ANY=[], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0xffffff51) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2e, 0x4, &(0x7f0000000080)=0x1) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) [ 3128.604143] loop4: detected capacity change from 0 to 1024 [ 3128.605876] loop5: detected capacity change from 0 to 4 [ 3128.615697] EXT4-fs (loop5): unsupported descriptor size 0 [ 3128.631475] loop0: detected capacity change from 0 to 1099 [ 3128.636748] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 3128.638807] loop1: detected capacity change from 0 to 1024 15:42:54 executing program 6: clock_nanosleep(0x2, 0x1, 0x0, 0x0) 15:42:54 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000174, 0x0, 0x0, 0x0) 15:42:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) (fail_nth: 100) 15:42:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000015b, 0x0, 0x0, 0x0) 15:42:54 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f0000000280)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x12}, @l2cap_cid_signaling={{0xe}, [@l2cap_conf_rsp={{0x5, 0xee, 0xa}, {0x3, 0x9b1, 0xa2, [@l2cap_conf_mtu={0x1, 0x2, 0x1}]}}]}}, 0x17) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f00000002c0)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) [ 3128.708937] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 3128.721849] loop5: detected capacity change from 0 to 4 [ 3128.728264] FAULT_INJECTION: forcing a failure. [ 3128.728264] name failslab, interval 1, probability 0, space 0, times 0 15:42:54 executing program 6: clock_nanosleep(0x5, 0x1, 0x0, 0x0) [ 3128.729323] CPU: 1 UID: 0 PID: 80504 Comm: syz-executor.5 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3128.729340] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3128.729349] Call Trace: [ 3128.729355] [ 3128.729360] dump_stack_lvl+0xfa/0x120 [ 3128.729388] should_fail_ex+0x4d7/0x5e0 [ 3128.729412] should_failslab+0xc2/0x120 [ 3128.729426] __kmalloc_cache_noprof+0x81/0x6b0 [ 3128.729441] ? __pfx_mntput_no_expire+0x10/0x10 [ 3128.729460] ? alloc_super+0x53/0xb50 [ 3128.729481] ? alloc_super+0x53/0xb50 [ 3128.729502] ? __pfx_super_s_dev_test+0x10/0x10 [ 3128.729516] alloc_super+0x53/0xb50 [ 3128.729533] ? lock_release+0xc8/0x290 [ 3128.729554] ? __pfx_super_s_dev_test+0x10/0x10 [ 3128.729569] sget_fc+0xfe/0xb80 [ 3128.729587] ? __pfx_super_s_dev_set+0x10/0x10 [ 3128.729604] get_tree_bdev_flags+0x1b8/0x620 [ 3128.729621] ? __pfx_ext4_fill_super+0x10/0x10 [ 3128.729641] ? __pfx_get_tree_bdev_flags+0x10/0x10 [ 3128.729660] ? cap_capable+0x9c/0x240 [ 3128.729681] ? security_capable+0x2f/0x90 [ 3128.729700] vfs_get_tree+0x93/0x340 [ 3128.729716] path_mount+0x726/0x2140 [ 3128.729728] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3128.729752] ? __pfx_path_mount+0x10/0x10 [ 3128.729765] ? getname_flags.part.0+0x1c6/0x540 [ 3128.729782] ? putname.part.0+0xc0/0x160 [ 3128.729797] __x64_sys_mount+0x293/0x310 [ 3128.729809] ? __pfx___x64_sys_mount+0x10/0x10 [ 3128.729825] do_syscall_64+0xbf/0x430 [ 3128.729844] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3128.729857] RIP: 0033:0x7f0af432604a [ 3128.729866] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3128.729878] RSP: 002b:00007f0af1899fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3128.729890] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0af432604a [ 3128.729899] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0af189a000 [ 3128.729906] RBP: 00007f0af189a040 R08: 00007f0af189a040 R09: 0000000020000000 [ 3128.729914] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 3128.729921] R13: 0000000020000100 R14: 00007f0af189a000 R15: 0000000020012a00 [ 3128.729937] 15:42:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000175, 0x0, 0x0, 0x0) 15:42:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3128.840188] loop5: detected capacity change from 0 to 4 [ 3128.845574] EXT4-fs (loop5): unsupported descriptor size 0 [ 3129.453916] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3129.453916] [ 3129.458015] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3129.458015] 15:43:06 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:06 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x28, r3, 0x1, 0x0, 0x0, {{0x39}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_TX_RATES={0xc, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x8, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x4, 0x4}]}]}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r3, 0x2, 0x70bd28, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x5, 0x7a}}}}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x41}, 0x48000) clock_nanosleep(0x3, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 15:43:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:43:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x89701, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:43:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000176, 0x0, 0x0, 0x0) 15:43:06 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:06 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x9, @none, 0x0, 0x2}, 0xe) 15:43:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3140.265605] loop5: detected capacity change from 0 to 4 [ 3140.278746] EXT4-fs (loop5): unsupported descriptor size 0 [ 3140.283966] loop0: detected capacity change from 0 to 1099 [ 3140.297278] loop5: detected capacity change from 0 to 4 [ 3140.303062] loop1: detected capacity change from 0 to 1024 [ 3140.308223] EXT4-fs (loop5): unsupported descriptor size 0 [ 3140.316901] netlink: 'syz-executor.6': attribute type 4 has an invalid length. [ 3140.335967] netlink: 'syz-executor.6': attribute type 4 has an invalid length. 15:43:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000177, 0x0, 0x0, 0x0) 15:43:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:06 executing program 6: clock_nanosleep(0x1, 0x1, 0x0, 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x100010, 0xffffffffffffffff, 0x10000000) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) syz_io_uring_submit(0x0, r0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)={r1, r2+10000000}, 0x1, 0x1, 0x1}, 0x1000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000001680)=ANY=[@ANYBLOB="010000000100000c18e60000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="ffffffff000000002e2f66696c653000"]) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r5, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) ppoll(&(0x7f00000016c0)=[{0xffffffffffffffff, 0x620}, {0xffffffffffffffff, 0x22}, {r3, 0x10}, {r4, 0xd80}, {r5, 0x1014}], 0x5, &(0x7f0000001700)={0x0, 0x3938700}, &(0x7f0000001740)={[0x7]}, 0x8) [ 3140.431032] loop5: detected capacity change from 0 to 4 [ 3140.442468] EXT4-fs (loop5): unsupported descriptor size 0 15:43:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000178, 0x0, 0x0, 0x0) [ 3140.457406] loop5: detected capacity change from 0 to 4 [ 3140.464694] EXT4-fs (loop5): unsupported descriptor size 0 15:43:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000840)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYRESOCT], 0xffdd) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r2 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:43:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:06 executing program 6: clock_nanosleep(0x4, 0x0, 0x0, 0x0) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index, 0x9, 0x0, 0x5, 0x0, 0x1, {0x0, r0}}, 0x0) 15:43:06 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000179, 0x0, 0x0, 0x0) [ 3140.586366] loop5: detected capacity change from 0 to 4 [ 3140.622366] EXT4-fs (loop5): unsupported descriptor size 0 [ 3140.634086] loop5: detected capacity change from 0 to 4 [ 3140.641071] EXT4-fs (loop5): unsupported descriptor size 0 15:43:06 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="02c850cc00c8000100034c080008000100020000000b08b00000000400bcbe84f86bcdab6fee9b6cb714ae142b9e5fb2bc4d467cdeffe6c166b24306e3d44b187773554757e286dd60d8502a4b75582469e5afeb123cb7a22d785b698abd9580bf593bb70888d45b6088de1e4e62cfacfa424792587c0a3ea74567a9516ed834aacb7f1b80575f965c150c754074731b24dc237bfd0af009baf89b3e1ed03f84ea37c2d78fc1db9b4d0ab4e4becb9a56809aaad0431d8e0019b8762df7f48b41b800881b27ffdb9c75e2e439064b04004000b1ee0322e726e961338c6803473077c2c0137dfeeeca5d9b1f36a77151051b96f50eb78f3a33c2d03d1993b9667be3168ea4ee18a261d487a21b3e30b8f6f7d7b170d9001c4d3f7cee5ca39482ff0d2978cb9739203aaf38506a66d00cb574af049125852d25800eaf678d5778f01d8e4326af3251e520f02a4336243c173d21bc0e7b35ea26712f3254e41bbddbbb4c75fe2179d70722f1270ec9eccbdb38736b16dc10dc8e4d89d9d7eefd7e3861b9318b891cd88b8211fc4c5deb4404ff9309f56a993d8d64949b10e5a4bf71731daf9708de3dce63b0be03622295c017e7f15f620c37af61b87aaac2a007aaaf82355652d36f22d63b08e2eab133c5d31a51b91921cdcdea98e72e2f35bb5ade81881b09c66fd4f6e03f4209bd0424091a6023f66a366e31356bb995c8a97a9197b7462f470d9e4ee0cda4939c92742781b41155c8faf8ed2be796a3043de6eee515516652e7d160b3f7c61a7db214c9587e6334f4075b4ce4336f3e6473b88ce53e"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="88d2c99903b13a1ea5f3bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="03c9009bc2301da5ff9150c5f6bf21f922e1bd6981f09e76e2fde4fa06652f54c641cb2bcd5173d07d4e61232ab4bcad341e79ac04fbcacd83884c718903fe8368588a40bfbe3f3e35cb79d3ce7d9afecc2c554d22e6ba1073b5627ae24f8b574a7514ab50875b6b92736bbcb76bee493d2cc81fc2199dc5ab8e5197cc001764553c45a27545c6a8f473021e670d0fce2db2ede7913a2aae1bb941fdbb20ad9e33ad96cf7b69a35e64a51297250fc165362d9de1557cf5faa4ad2f1c72479bf315bfc0006fdccb9470772efcb3cebe286f955415de34fe3c930c4c31b32e48781784842ff06b30d70366e136b0eb786c09c3a96f3fe7a41e767f550dc83ee5589b3c268945f42d027f5e011926c4165104664229cac78f013f372092b12ff4c3345b0168cb148a0e9636b71e947b1dc132328d0ae9a4d0ac1fa83df77368b709703c7892a45f48c20ef148e6a8f5747024b03dea6eb3804c7d376784b947a02ef48b0ec965af260b9f58b9c8a792a819f36d4eea0e79e849142140dfe705cb3c09747fdff4333dc713245743a34c80e1b68fea4fff4825152378e1906e443dc134449e9e358c7db3663fdebadd1b4f89ef3c0d29c8a0495091e7d3311cbb310db7b43c8176b8175071983a26607d793fc914c034f0493ee6c5318bcf4a92e39d54300511edb91241e4ebd8d04a0ebc5730e5414ae9ddb0248fe12261f32d4e0f27230398b28d8d195e667e5885c6aa"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) [ 3141.120085] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3141.120085] [ 3141.123690] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3141.123690] 15:43:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x89801, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:43:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:43:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000017a, 0x0, 0x0, 0x0) 15:43:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:16 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:16 executing program 6: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x940a}}, './file0\x00'}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r3, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x40101, 0x0) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c, 0x80800) poll(&(0x7f0000000100)=[{r0, 0x4}, {0xffffffffffffffff, 0x8}, {r1, 0x1}, {0xffffffffffffffff, 0x20}, {r2, 0x1000}, {r3, 0x1008}, {r4, 0x8}, {}, {r5, 0x5200}, {0xffffffffffffffff, 0x928}], 0xa, 0xe4a) clock_nanosleep(0x4, 0x1, 0x0, 0x0) 15:43:16 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:16 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db16abe"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f0000000280)=ANY=[@ANYBLOB="02c80100ff0fda47ba8e000005000300020703009ff37d79193063a31aec8dba262e0455dc36b19443a48b60cf43a7892756935cd36d5716461c550f479f02b419c895dcc789cd42133039db46411f1c6e5fd2be8e89bdd096c9d5828a6eb7570a3da85599cdaff30a01412eea5ab057dfaad9d74ac79408afeb87f99cddd15995df7404581801ff8023513d0fe2446140a92c68ab5eb3594af9000000000000000000000000001e8e0c073319b6be76806e826ccc9a223b45031635157b4251cd4a58459498722f47796df66600e5be35cd57c1cc131ab0e697f5c941ab8f015afb622ebf78e26e5e03f460bf93064db34b266a2634dbd0f5602fc995bc4a1eb2bd4299e862a33582092a0ec2adc1d9526284ce8f1fdf14f136c0ba7bf035219ecdf3cc459b94625c2eb6557105b45b"], 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) [ 3150.199095] loop0: detected capacity change from 0 to 1100 [ 3150.204277] loop1: detected capacity change from 0 to 1024 [ 3150.243765] loop5: detected capacity change from 0 to 4 15:43:16 executing program 6: clock_nanosleep(0x4, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x6aff, &(0x7f0000000140)) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x0, r2) fcntl$dupfd(r1, 0x0, r1) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r3 = signalfd4(r1, &(0x7f00000000c0)={[0x20]}, 0x8, 0x80800) r4 = io_uring_setup(0x6aff, &(0x7f0000000140)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0xa, 0x0, r5) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x5, 0x0, r3, 0x80, &(0x7f00000001c0)=@l2={0x1f, 0x81, @any, 0x21}, 0x0, 0x0, 0x0, {0x0, r5}}, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000004940)=[{{&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @broadcast}}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000400)=""/4096, 0x1000}, 0x1}, {{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/138, 0x8a}, {&(0x7f0000001400)=""/115, 0x73}, {&(0x7f0000001480)=""/71, 0x47}, {&(0x7f0000001500)=""/116, 0x74}], 0x4}, 0x7f}, {{&(0x7f0000001580)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001600)=""/228, 0xe4}], 0x1, &(0x7f0000001740)=""/18, 0x12}, 0x7ff}, {{&(0x7f0000001780)=@alg, 0x80, &(0x7f0000002a00)=[{&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000002800)=""/92, 0x5c}, {&(0x7f0000002880)=""/214, 0xd6}, {&(0x7f0000002980)=""/86, 0x56}], 0x4, &(0x7f0000002a40)=""/30, 0x1e}, 0x6}, {{&(0x7f0000002a80)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002b00)=""/228, 0xe4}, {&(0x7f0000002c00)=""/80, 0x50}, {&(0x7f0000002c80)=""/83, 0x53}], 0x3, &(0x7f0000002d40)=""/116, 0x74}, 0x3}, {{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000002dc0)=""/245, 0xf5}, {&(0x7f0000002ec0)=""/238, 0xee}, {&(0x7f0000002fc0)=""/130, 0x82}], 0x3, &(0x7f00000030c0)=""/199, 0xc7}, 0x2}, {{&(0x7f00000031c0)=@xdp, 0x80, &(0x7f0000003640)=[{&(0x7f0000003240)=""/100, 0x64}, {&(0x7f00000032c0)=""/113, 0x71}, {&(0x7f0000003340)=""/124, 0x7c}, {&(0x7f00000033c0)=""/40, 0x28}, {&(0x7f0000003400)=""/218, 0xda}, {&(0x7f0000003500)=""/175, 0xaf}, {&(0x7f00000035c0)=""/20, 0x14}, {&(0x7f0000003600)=""/23, 0x17}], 0x8, &(0x7f00000036c0)=""/155, 0x9b}, 0xfff}, {{&(0x7f0000003780)=@alg, 0x80, &(0x7f0000004840)=[{&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000004800)}], 0x2, &(0x7f0000004880)=""/188, 0xbc}, 0x81}], 0x8, 0x2, &(0x7f0000004b40)={0x0, 0x989680}) [ 3150.260430] EXT4-fs (loop5): unsupported descriptor size 0 [ 3150.276900] loop5: detected capacity change from 0 to 4 [ 3150.285124] EXT4-fs (loop5): unsupported descriptor size 0 15:43:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000017b, 0x0, 0x0, 0x0) 15:43:16 executing program 6: clock_nanosleep(0x2, 0x1, 0x0, 0x0) syz_io_uring_setup(0x3651, &(0x7f0000000000)={0x0, 0xf7af, 0x1, 0x3, 0x8e}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000100)=@IORING_OP_WRITE_FIXED={0x5, 0x5, 0x0, @fd_index=0x1, 0x100000001, 0x6, 0x5d1, 0x10, 0x1, {0x1, r1}}, 0x7) 15:43:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:16 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:16 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3150.422222] loop5: detected capacity change from 0 to 4 [ 3150.432591] cgroup: fork rejected by pids controller in /syz4 [ 3150.434188] EXT4-fs (loop5): unsupported descriptor size 0 15:43:16 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f0000000280)=ANY=[@ANYBLOB="2c1a51240bf3230d22f5a041937245442819cdd38c8106124915bbbd5bee303f8d9f754c2f38e6bbcc", @ANYBLOB="d88c86698a15b040d209e43d5e67d63ce0666d5c45775689282efd8ce149c12f56a2d63fec86f3e42331fb9bac33954afb0540c54cf2664766c45de37c5af6ac79bb319876e574a7329d761afa3ac7a6ec714a6004ecdf3d238629fdd4a51c45387759454013801333564a61af5373e8e0dd19f434d3a8f2116c8273b36311359720e24ef14b00329710f931d4d0"], 0x8) syz_emit_vhci(&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) [ 3150.453155] loop5: detected capacity change from 0 to 4 [ 3150.469913] EXT4-fs (loop5): unsupported descriptor size 0 15:43:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000017c, 0x0, 0x0, 0x0) [ 3151.035677] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3151.035677] [ 3151.038852] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3151.038852] 15:43:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000017d, 0x0, 0x0, 0x0) 15:43:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:43:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c003, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:43:27 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x61) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x1004, 0xffffffff7ffffffe, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000240)=ANY=[@ANYRESOCT], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:43:27 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:27 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x2, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:27 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3160.993991] loop0: detected capacity change from 0 to 1120 [ 3161.020617] loop5: detected capacity change from 0 to 4 [ 3161.022420] loop1: detected capacity change from 0 to 1024 [ 3161.034716] EXT4-fs (loop5): unsupported descriptor size 0 [ 3161.048155] loop5: detected capacity change from 0 to 4 [ 3161.053967] EXT4-fs (loop5): unsupported descriptor size 0 15:43:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000017e, 0x0, 0x0, 0x0) 15:43:27 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x401}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0xa, 0x8a2, 0x7, 0xb, 0xf7}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:43:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:27 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3161.190112] loop5: detected capacity change from 0 to 4 [ 3161.205825] EXT4-fs (loop5): unsupported descriptor size 0 15:43:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000017f, 0x0, 0x0, 0x0) [ 3161.226200] loop5: detected capacity change from 0 to 4 [ 3161.237123] EXT4-fs (loop5): unsupported descriptor size 0 15:43:27 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000001040)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000e00)=ANY=[@ANYBLOB="03c9009bc2301da5ff9150c5f6bf21f922e1bd6981f09e76e2fde4fa06652f54c641cb2bcd5573d07d4e61232ab4bcad341e79ac04fbcacd83884c718903fe8368588a40bfbe3f3e35cb79d3ce7d9afecc2c554d22e6ba109765627ae24f8b574a7514ab50875b6b92736bbcb76bee493d2cc81fc2199dc5ab8e5197cc001764553c45a27545c6a8f473021e670d0fce2db2ede7913a2aae1bb941fdbb20ad9e33ad96cf7b69a35e64a51297250fc165362d9de1557cf5faa4ad2f1c72479bf315bfc0006fdccb9470772efcb3cebe286f955415de34fe3c930c4c31b32e48781784842ff06b30d70366e136b0eb786c09c3a96f3fe7a41e767f550dc83ee5589b3c268945f42d027f5e011926c4165104664229cac78f013f372092b12ff4c3345b0168cb148a0e9636b71e947b1dc132328d0ae9a4d0ac1fa83df77368b709703c7892a45f48c20ef148e6a8f5747024b03dea6eb3804c7d376784b947a02ef48b0ec965af260b9f58b9c8a792a819f36d4eea0e79e849142140dfe705cb3c09747fdff4333dc713245743a34c80e1b68fea4fff4825152378e1906e443dc134449e9e358c7db3663fdebadd1b4f89ef3cc8a0495091e7d3311cbb310db7b43c8176b8175071983a26607d793fc914c034f0493ee6c5318bcf4a92e39d54300511edb91241ecebd8d04a0ebc5730e5414ae9ddb0248fe12261f32d4e0f27230398b28d8d195e667e5885c6aa"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000280)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xb) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:43:27 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3161.375953] cgroup: fork rejected by pids controller in /syz6 [ 3161.383792] loop5: detected capacity change from 0 to 4 [ 3161.392732] EXT4-fs (loop5): unsupported descriptor size 0 15:43:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000180, 0x0, 0x0, 0x0) 15:43:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3161.538906] loop5: detected capacity change from 0 to 4 [ 3161.541862] EXT4-fs (loop5): unsupported descriptor size 0 [ 3161.545382] loop5: detected capacity change from 0 to 4 [ 3161.546932] EXT4-fs (loop5): unsupported descriptor size 0 [ 3161.831971] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3161.831971] [ 3161.843270] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3161.843270] 15:43:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:43:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8ff01, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:43:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:43:38 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000181, 0x0, 0x0, 0x0) 15:43:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000014c, 0x0, 0x0, 0x0) 15:43:38 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x6, 0x80000001, 0x7, 0x200004a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:43:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3171.887636] loop5: detected capacity change from 0 to 4 [ 3171.896267] EXT4-fs (loop5): unsupported descriptor size 0 [ 3171.906003] loop5: detected capacity change from 0 to 4 [ 3171.911252] EXT4-fs (loop5): unsupported descriptor size 0 [ 3171.957929] loop0: detected capacity change from 0 to 1151 [ 3171.961187] loop6: detected capacity change from 0 to 1024 [ 3171.962255] loop1: detected capacity change from 0 to 1024 [ 3171.979649] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 15:43:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x0) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000182, 0x0, 0x0, 0x0) 15:43:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3172.096117] loop5: detected capacity change from 0 to 4 [ 3172.132874] EXT4-fs (loop5): unsupported descriptor size 0 15:43:38 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="02c81d000500008102190304000000"], 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="040f0404001104a8f502c7f56d7b64e8a8de75506f54588e80ba24a23f7c4f6af9aae09bb6ee1c57875aef328ca137ee37f43c9094fc209f4aa96f25caf67c31735e937faf989706d7907a36f7eb24ccea7e1b4a268c1a95efcf9a06097204c3d16ca08530b6d73f98b2734c1d2ee90cab81193ab5e117f85ded2403fa970c5f867c5f02457cb4f25ecc64299a320843ced0eb76f5296304417a9055b0f872d9ee733e47e9d7a2279e1649ea2c1baf9f2beb1a87759347e1c01c22d3fe8b7a87c5907d4d5df0ec3f47fce67f11241c4ec384afa6bf7bf297e050c869a25c6ac143999e0f2d77f56ef1cf2dd1e7ec53fae4aa77bb6015e94bd0722955c5531ea54c3c8cc874076cf67162f4fa24b27bc400b48244fb0cd563f5f4c270a7409e7feba12ca6702644b1651662c795fc14d81edc0cbdee43367316dede18d0096fa844f20d39de22f33b181b2efe192530c81a9fa2c423c6feafe09f885ef46115d85e46b8b7efdb3157932e23d619d3be81588bc9d04daa6c55c4331dd8a62882da5e066f32ff817c070a2fe7e521d8fbcf7f437500273487dd225b3ca5d4feba9890e5fabd02ef90010000000000000092b9ddae"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) [ 3172.172160] loop5: detected capacity change from 0 to 4 [ 3172.176669] EXT4-fs (loop5): unsupported descriptor size 0 [ 3172.178249] loop1: detected capacity change from 0 to 1024 [ 3172.202437] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 15:43:38 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000183, 0x0, 0x0, 0x0) 15:43:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3172.333011] loop5: detected capacity change from 0 to 4 [ 3172.334287] loop1: detected capacity change from 0 to 1024 [ 3172.344325] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 [ 3172.348654] EXT4-fs (loop5): unsupported descriptor size 0 [ 3172.367777] loop5: detected capacity change from 0 to 4 [ 3172.377223] EXT4-fs (loop5): unsupported descriptor size 0 [ 3172.782020] EXT4-fs warning (device loop6): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3172.782020] [ 3172.790030] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3172.790030] 15:43:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000184, 0x0, 0x0, 0x0) 15:43:47 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169", 0xe}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8ff0f, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:43:47 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2a, &(0x7f0000000080)="716c26f6333bb91a005ef44fcd7d23d6e625f7c1813acc8635c78de84ee209998594da47b6ca0e7f0d9afbfcf4fff53205f916653b8d6a1c1ca6f32aa79b737d9017c5678068a9ee036ef24faf40c5dafa4580d638524da1f8cbf0cd6a1678d0d9109df6b196a8fb6a394924c1b9aac50c1e8de9a4c6b1ad581044b7807a48c4b8eae9b58b33b686", 0x88) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000380)=0x8000, 0x4) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x14, 0x3, 0x1ff) r3 = fork() process_vm_readv(r3, &(0x7f0000002fc0)=[{&(0x7f0000000240)=""/166, 0xa6}, {&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000640)=""/18, 0x12}], 0x3, &(0x7f00000029c0)=[{&(0x7f0000000300)=""/111, 0x6f}, {&(0x7f0000000440)=""/185, 0x5a}, {&(0x7f0000000040)=""/60, 0x38}, {&(0x7f0000000540)=""/230, 0xe6}], 0x4, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r4, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x8, 0x1f, 0x1, 0x7f, 0x0, 0x5, 0x80, 0x18, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000180), 0xa}, 0x40, 0x9, 0x0, 0x6, 0x40, 0x7, 0x1000, 0x0, 0x0, 0x0, 0xb57}, r3, 0xd, r4, 0x0) setsockopt$sock_int(r2, 0x1, 0x2b, &(0x7f0000000140)=0x80000001, 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1, 0x8, 0x4, 0x48, 0x0, 0x8000, 0x40db8, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0x3}, 0x2, 0xfffffffffffffffa, 0x3, 0x9, 0x5d46, 0x7ff, 0xed1, 0x0, 0x0, 0x0, 0x8000}, 0xffffffffffffffff, 0x5, r1, 0x3) getresuid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) clock_nanosleep(0x4, 0x0, 0x0, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r5, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000680)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) 15:43:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:43:47 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="02c850cc00c8000100034c080008000100020000000b08b00000000400bcbe84f86bcdab6fee9b6cb714ae142b9e5fb2bc4d467cdeffe6c166b24306e3d44b187773554757e286dd60d8502a4b75582469e5afeb123cb7a22d785b698abd9580bf593bb70888d45b6088de1e4e62cfacfa424792587c0a3ea74567a9516ed834aacb7f1b80575f965c150c754074731b24dc237bfd0af009baf89b3e1ed03f84ea37c2d78fc1db9b4d0ab4e4becb9a56809aaad0431d8e0019b8762df7f48b41b800881b27ffdb9c75e2e439064b04004000b1ee0322e726e961338c6803473077c2c0137dfeeeca5d9b1f36a77151051b96f50eb78f3a33c2d03d1993b9667be3168ea4ee18a261d487a21b3e30b8f6f7d7b170d9001c4d3f7cee5ca39482ff0d2978cb9739203aaf38506a66d00cb574af049125852d25800eaf678d5778f01d8e4326af3251e520f02a4336243c173d21bc0e7b35ea26712f3254e41bbddbbb4c75fe2179d70722f1270ec9eccbdb38736b16dc10dc8e4d89d9d7eefd7e3861b9318b891cd88b8211fc4c5deb4404ff9309f56a993d8d64949b10e5a4bf71731daf9708de3dce63b0be03622295c017e7f15f620c37af61b87aaac2a007aaaf82355652d36f22d63b08e2eab133c5d31a51b91921cdcdea98e72e2f35bb5ade81881b09c66fd4f6e03f4209bd0424091a6023f66a366e31356bb995c8a97a9197b7462f470d9e4ee0cda4939c92742781b41155c8faf8ed2be796a3043de6eee515516652e7d160b3f7c61a7db214c9587e6334f4075b4ce4336f3e6473b88ce53e"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000280)={0x9, 0x8a3, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:43:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:47 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3181.629146] loop5: detected capacity change from 0 to 4 [ 3181.634261] loop0: detected capacity change from 0 to 1151 [ 3181.639726] loop1: detected capacity change from 0 to 1024 [ 3181.645641] EXT4-fs (loop5): unsupported descriptor size 0 [ 3181.667267] loop5: detected capacity change from 0 to 4 [ 3181.678174] EXT4-fs (loop5): unsupported descriptor size 0 [ 3181.678294] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 15:43:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000185, 0x0, 0x0, 0x0) [ 3181.723912] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 15:43:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="02c800180014c5d3df86bb328db3ac00"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9f) syz_emit_vhci(&(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x81, 0x2}, {0x3}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000e00)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYRESOCT], 0x7) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff8ffffffffffffffff9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:43:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:43:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:48 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169", 0xe}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3181.812627] loop5: detected capacity change from 0 to 4 [ 3181.817861] EXT4-fs (loop5): unsupported descriptor size 0 [ 3181.838920] loop1: detected capacity change from 0 to 1024 [ 3181.853318] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 15:43:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x27, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:48 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3181.881835] loop5: detected capacity change from 0 to 4 [ 3181.892243] EXT4-fs (loop5): unsupported descriptor size 0 [ 3181.902300] loop5: detected capacity change from 0 to 4 [ 3181.908698] EXT4-fs (loop5): unsupported descriptor size 0 [ 3181.928510] loop1: detected capacity change from 0 to 1024 15:43:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3181.942123] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 [ 3182.460466] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3182.460466] 15:43:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:43:57 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000186, 0x0, 0x0, 0x0) 15:43:57 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[], 0xa) syz_emit_vhci(&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xd1) syz_emit_vhci(&(0x7f0000000700)=ANY=[@ANYBLOB="02c800180014c7d3df86bb3278b3ac0021d857b5e701d8356cf18cee16e73384e2cc8b38f0753c601731db79a33d08dce12f7d10b325d7bf671d38b22b81290debbe72305cc77663d656ae39bb6ca36e2a070f496e2fc715eca46011296d4b4a259eb2af71eceb7c1b3cea5cd2ab828d164459ea6f3dac1d99ca2348e0c808403da5cd3e196dc3a948349863366c0a61588b216263ad86f985c953970065c9510bd86ea64ad1ce3eed2364f32fafb387d922e746f877a45a1148f2933f0ff9e183cf8855"], 0x1d) syz_emit_vhci(&(0x7f0000000bc0)=ANY=[@ANYBLOB="03c9009bc2301da5ff9150c5f6bf21f922e1bd6981f09e76e2fde4fa06652f54c641cb2bcd5173d07d4e61232ab4bcad341e79ac04fbcacd83884c718903fe8368588a40bfbe3f3e35cb79d3ce7d9afecc2c554d22e6ba1073b5627ae24f8b574a7514ab50875b6b92736bbcb76bee493d2cc81fc2199dc5ab8e5197cc001764553c45a27545c6a8f473021e670d0fce2db2ede7913a2aae1bb941fdbb20ad9e33ad96cf7b69a35e64a51297250fc165362d9de1557cf5faa4ad2f1c72479bf315bfc0006fdccb9470772efcb3cebe286f955415de34fe3c930c4c31b32e48781784842ff06b30d70366e136b0eb786c09c3a96f3fe7a41e767f550dc83ee5589b3c268945f42d027f5e011926c4165104664229cac78f013f372092b12ff4c3345b0168cb148a0e9636b71e947b1dc132328d0ae9a4d0ac1fa83df77368b709703c7892a45f48c20ef148e6a8f5747024b03dea6eb3804c7d376784b947a02ef48b0ec965af260b9f58b9c8a792a819f36d4eea0e79e849142140dfe705cb3c09747fdff4333dc713245743a34c80e1b68fea4fff4825152378e1906e443dc134449e9e358c7db3663fdebadd1b4f89ef3c0d29c8a0495091e7d3311cbb310db7b43c8176b8175071983a26607d793fc914c034f0493ee6c5318bcf4a92e39d54300511edb91241e4ebd8d04a0ebc5730e5414ae9ddb0248fe12261f32d4e0f27230398b28d8d195e667e5885c6aa"], 0x9f) syz_emit_vhci(&(0x7f0000000440)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x3, 0x0, 0xfffffe45}, @l2cap_cid_le_signaling={{0x6}, @l2cap_le_conn_req={{0x14, 0x3f}, {0x4998, 0x81, 0x4, 0x81, 0x8}}}}, 0xf) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4c4c0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x0, &(0x7f0000000000)) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="02e52110f4c875250ad179ce0800014487223b0000000000000046ca883f149af2bdb82a1f3d89988932c4ae497edcaacd2a71173956a9487f80881d1cb5cfc5f56d5f8bda86e5d1075873118a131e327c250ca795cda0cf4822927d522693d22c999acdeff880c23ca05237af9b9389eb68e6b407c08c6fb28f41408c"], 0x11) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x2, 0x6, &(0x7f0000000080)) r1 = syz_open_dev$rtc(&(0x7f0000000800), 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x7fff) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000000180)=0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x9, 0x8a2, 0x7, 0x4a, 0x3}) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) 15:43:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:43:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:43:57 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14", 0xc}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:43:57 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r2, 0x301}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000600), r0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r3) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r4, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa1}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_SHORT_ADDR={0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x4880}, 0x80) clock_nanosleep(0x4, 0x0, 0x0, 0x0) 15:43:57 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3191.689569] loop5: detected capacity change from 0 to 4 [ 3191.694508] EXT4-fs (loop5): unsupported descriptor size 0 [ 3191.705967] loop5: detected capacity change from 0 to 4 [ 3191.713391] EXT4-fs (loop5): unsupported descriptor size 0 15:43:57 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000187, 0x0, 0x0, 0x0) [ 3191.743757] loop0: detected capacity change from 0 to 2048 [ 3191.745973] loop1: detected capacity change from 0 to 1024 [ 3191.766814] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 15:43:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3191.887345] loop5: detected capacity change from 0 to 4 [ 3191.925816] EXT4-fs (loop5): unsupported descriptor size 0 [ 3191.951310] loop5: detected capacity change from 0 to 4 [ 3191.964299] EXT4-fs (loop5): unsupported descriptor size 0 [ 3192.570662] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3192.570662] 15:44:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) (fail_nth: 1) 15:44:07 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000188, 0x0, 0x0, 0x0) 15:44:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:44:07 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) (fail_nth: 1) 15:44:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) (fail_nth: 1) 15:44:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:44:07 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:44:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400), 0x0, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3201.441428] loop0: detected capacity change from 0 to 1024 [ 3201.446744] FAULT_INJECTION: forcing a failure. [ 3201.446744] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3201.447817] CPU: 1 UID: 0 PID: 83632 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3201.447834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3201.447841] Call Trace: [ 3201.447846] [ 3201.447852] dump_stack_lvl+0xfa/0x120 [ 3201.447876] should_fail_ex+0x4d7/0x5e0 [ 3201.447905] _copy_from_user+0x30/0xd0 [ 3201.447929] move_addr_to_kernel.part.0+0x40/0x120 [ 3201.447954] __sys_sendto+0x1da/0x570 [ 3201.447980] ? __pfx___sys_sendto+0x10/0x10 [ 3201.448017] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 3201.448041] ? __fget_files+0x20d/0x3b0 [ 3201.448072] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3201.448094] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3201.448116] ? ksys_write+0x1a3/0x240 [ 3201.448138] ? __pfx_ksys_write+0x10/0x10 [ 3201.448166] __x64_sys_sendto+0xe1/0x1c0 [ 3201.448185] ? do_syscall_64+0x85/0x430 [ 3201.448203] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3201.448229] do_syscall_64+0xbf/0x430 [ 3201.448256] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3201.448270] RIP: 0033:0x7fcd1edb3b19 [ 3201.448280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3201.448292] RSP: 002b:00007fcd1c329188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 3201.448304] RAX: ffffffffffffffda RBX: 00007fcd1eec6f60 RCX: 00007fcd1edb3b19 [ 3201.448312] RDX: 0000000000000038 RSI: 0000000020000180 RDI: 0000000000000003 [ 3201.448320] RBP: 00007fcd1c3291d0 R08: 0000000020000000 R09: 0000000000000010 [ 3201.448327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3201.448334] R13: 00007ffe66e34d5f R14: 00007fcd1c329300 R15: 0000000000022000 [ 3201.448368] [ 3201.455315] FAULT_INJECTION: forcing a failure. [ 3201.455315] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3201.458811] EXT4-fs warning (device loop0): read_mmp_block:114: Error -117 while reading MMP block 0 [ 3201.461836] CPU: 0 UID: 0 PID: 83634 Comm: syz-executor.4 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3201.461874] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3201.461889] Call Trace: [ 3201.461897] [ 3201.461907] dump_stack_lvl+0xfa/0x120 [ 3201.461966] should_fail_ex+0x4d7/0x5e0 [ 3201.462011] _copy_from_user+0x30/0xd0 [ 3201.462054] move_addr_to_kernel.part.0+0x40/0x120 [ 3201.462093] __sys_bind+0x14b/0x2b0 [ 3201.462133] ? __pfx___sys_bind+0x10/0x10 [ 3201.462179] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3201.462223] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3201.462268] ? ksys_write+0x1a3/0x240 [ 3201.462310] ? __pfx_ksys_write+0x10/0x10 [ 3201.462352] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 [ 3201.462399] __x64_sys_bind+0x73/0xb0 [ 3201.462439] do_syscall_64+0xbf/0x430 [ 3201.462477] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3201.462510] RIP: 0033:0x7ffacc7bdb19 [ 3201.462529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3201.462554] RSP: 002b:00007ffac9d33188 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 3201.462580] RAX: ffffffffffffffda RBX: 00007ffacc8d0f60 RCX: 00007ffacc7bdb19 [ 3201.462598] RDX: 000000000000000e RSI: 0000000020000100 RDI: 0000000000000004 [ 3201.462614] RBP: 00007ffac9d331d0 R08: 0000000000000000 R09: 0000000000000000 [ 3201.462630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3201.462645] R13: 00007ffefe4f04cf R14: 00007ffac9d33300 R15: 0000000000022000 [ 3201.462680] [ 3201.471562] FAULT_INJECTION: forcing a failure. [ 3201.471562] name failslab, interval 1, probability 0, space 0, times 0 [ 3201.474912] loop1: detected capacity change from 0 to 1024 [ 3201.476760] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 [ 3201.477147] CPU: 0 UID: 0 PID: 83637 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3201.477183] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3201.477197] Call Trace: [ 3201.477206] [ 3201.477216] dump_stack_lvl+0xfa/0x120 [ 3201.477253] should_fail_ex+0x4d7/0x5e0 [ 3201.477298] should_failslab+0xc2/0x120 [ 3201.477325] __kmalloc_cache_noprof+0x81/0x6b0 [ 3201.477360] ? task_active_pid_ns+0xa9/0xd0 [ 3201.477388] ? alloc_name+0x41/0x110 [ 3201.477430] ? alloc_name+0x41/0x110 [ 3201.477466] alloc_name+0x41/0x110 [ 3201.477510] __x64_sys_memfd_create+0x130/0x280 [ 3201.477550] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 3201.477589] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 [ 3201.477638] do_syscall_64+0xbf/0x430 [ 3201.477676] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3201.477702] RIP: 0033:0x7fa3f8d1db19 [ 3201.477721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3201.477746] RSP: 002b:00007fa3f6292f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3201.477771] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fa3f8d1db19 [ 3201.477789] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007fa3f8d770fb [ 3201.477806] RBP: 0000000000000004 R08: 0000000000010000 R09: ffffffffffffffff [ 3201.477822] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3201.477838] R13: 0000000020000100 R14: 0000000000080000 R15: 0000000020012a00 [ 3201.477872] [ 3201.481818] loop5: detected capacity change from 0 to 4 [ 3201.517470] EXT4-fs (loop5): unsupported descriptor size 0 [ 3201.527264] loop0: detected capacity change from 0 to 1024 [ 3201.536167] EXT4-fs warning (device loop0): read_mmp_block:114: Error -117 while reading MMP block 0 [ 3201.542594] loop5: detected capacity change from 0 to 4 [ 3201.547385] EXT4-fs (loop5): unsupported descriptor size 0 15:44:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) (fail_nth: 2) 15:44:07 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) (fail_nth: 2) 15:44:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) (fail_nth: 2) 15:44:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3201.602766] loop3: detected capacity change from 0 to 1024 [ 3201.617185] FAULT_INJECTION: forcing a failure. [ 3201.617185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3201.618168] CPU: 1 UID: 0 PID: 83745 Comm: syz-executor.4 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3201.618184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3201.618192] Call Trace: [ 3201.618196] [ 3201.618201] dump_stack_lvl+0xfa/0x120 [ 3201.618223] should_fail_ex+0x4d7/0x5e0 [ 3201.618246] _copy_to_user+0x32/0xd0 [ 3201.618268] simple_read_from_buffer+0xe0/0x180 [ 3201.618287] proc_fail_nth_read+0x18a/0x240 [ 3201.618301] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 3201.618314] ? security_file_permission+0x22/0x90 [ 3201.618328] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 3201.618340] vfs_read+0x1eb/0xc70 [ 3201.618362] ? __pfx_vfs_read+0x10/0x10 [ 3201.618382] ? lock_release+0xc8/0x290 [ 3201.618404] ? __fget_files+0x20d/0x3b0 [ 3201.618428] ksys_read+0x121/0x240 [ 3201.618446] ? __pfx_ksys_read+0x10/0x10 [ 3201.618465] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 15:44:07 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000189, 0x0, 0x0, 0x0) [ 3201.618493] do_syscall_64+0xbf/0x430 [ 3201.618511] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3201.618525] RIP: 0033:0x7ffacc77069c [ 3201.618534] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3201.618546] RSP: 002b:00007ffac9d33170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3201.618557] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffacc77069c [ 3201.618566] RDX: 000000000000000f RSI: 00007ffac9d331e0 RDI: 0000000000000003 [ 3201.618573] RBP: 00007ffac9d331d0 R08: 0000000000000000 R09: 0000000000000000 [ 3201.618581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3201.618588] R13: 00007ffefe4f04cf R14: 00007ffac9d33300 R15: 0000000000022000 [ 3201.618604] [ 3201.645651] loop0: detected capacity change from 0 to 1024 [ 3201.652895] EXT4-fs warning (device loop0): read_mmp_block:114: Error -117 while reading MMP block 64 15:44:07 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:44:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400), 0x0, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3201.681689] FAULT_INJECTION: forcing a failure. [ 3201.681689] name failslab, interval 1, probability 0, space 0, times 0 [ 3201.682762] CPU: 1 UID: 0 PID: 83749 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3201.682783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3201.682792] Call Trace: [ 3201.682799] [ 3201.682806] dump_stack_lvl+0xfa/0x120 [ 3201.682835] should_fail_ex+0x4d7/0x5e0 [ 3201.682865] ? dst_alloc+0x9c/0x620 [ 3201.682884] should_failslab+0xc2/0x120 15:44:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3201.682899] kmem_cache_alloc_noprof+0x80/0x690 [ 3201.682931] ? dst_alloc+0x9c/0x620 [ 3201.682948] ? lock_is_held_type+0x9e/0x120 [ 3201.682964] dst_alloc+0x9c/0x620 [ 3201.682990] rt_dst_alloc+0x50/0x3d0 [ 3201.683014] ip_route_output_key_hash_rcu+0x894/0x2370 [ 3201.683043] ip_route_output_key_hash+0x10f/0x2b0 [ 3201.683057] ? __pfx_ip_route_output_key_hash+0x10/0x10 [ 3201.683069] ? __pfx_perf_tp_event+0x10/0x10 [ 3201.683095] ? lock_acquire+0x15e/0x2f0 [ 3201.683115] ? raw_sendmsg+0x5be/0x3020 [ 3201.683137] ? find_held_lock+0x2b/0x80 [ 3201.683160] ip_route_output_flow+0x27/0x150 [ 3201.683179] raw_sendmsg+0xbef/0x3020 [ 3201.683218] ? __pfx_raw_sendmsg+0x10/0x10 [ 3201.683238] ? perf_trace_run_bpf_submit+0xef/0x180 [ 3201.683267] ? perf_trace_lock_acquire+0x3c2/0x700 [ 3201.683320] ? sock_has_perm+0x21c/0x2b0 [ 3201.683337] ? __pfx_sock_has_perm+0x10/0x10 [ 3201.683352] ? __might_fault+0xe0/0x190 [ 3201.683371] ? find_held_lock+0x2b/0x80 [ 3201.683386] ? __might_fault+0x138/0x190 [ 3201.683404] ? lock_release+0xc8/0x290 [ 3201.683425] ? __might_fault+0xe0/0x190 [ 3201.683453] ? __pfx_raw_sendmsg+0x10/0x10 [ 3201.683479] inet_sendmsg+0x121/0x150 [ 3201.683508] __sys_sendto+0x4a2/0x570 [ 3201.683535] ? __pfx___sys_sendto+0x10/0x10 [ 3201.683572] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 3201.683610] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3201.683631] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3201.683654] ? ksys_write+0x1a3/0x240 [ 3201.683676] ? __pfx_ksys_write+0x10/0x10 [ 3201.683705] __x64_sys_sendto+0xe1/0x1c0 [ 3201.683723] ? do_syscall_64+0x85/0x430 [ 3201.683741] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3201.683764] do_syscall_64+0xbf/0x430 [ 3201.683785] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3201.683799] RIP: 0033:0x7fcd1edb3b19 [ 3201.683809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3201.683820] RSP: 002b:00007fcd1c329188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 3201.683832] RAX: ffffffffffffffda RBX: 00007fcd1eec6f60 RCX: 00007fcd1edb3b19 [ 3201.683840] RDX: 0000000000000038 RSI: 0000000020000180 RDI: 0000000000000003 [ 3201.683850] RBP: 00007fcd1c3291d0 R08: 0000000020000000 R09: 0000000000000010 [ 3201.683860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3201.683869] R13: 00007ffe66e34d5f R14: 00007fcd1c329300 R15: 0000000000022000 [ 3201.683907] 15:44:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:44:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3201.767123] loop1: detected capacity change from 0 to 1024 [ 3201.783293] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 [ 3201.795201] loop5: detected capacity change from 0 to 4 [ 3201.809170] EXT4-fs (loop5): unsupported descriptor size 0 [ 3201.825169] loop5: detected capacity change from 0 to 4 [ 3201.834614] EXT4-fs (loop5): unsupported descriptor size 0 15:44:08 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) (fail_nth: 3) 15:44:08 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:44:08 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000018a, 0x0, 0x0, 0x0) 15:44:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3201.928803] loop0: detected capacity change from 0 to 1024 [ 3202.433851] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3202.433851] [ 3202.758597] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3202.758597] [ 3212.826085] loop0: detected capacity change from 0 to 1024 15:44:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:44:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400), 0x0, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:44:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:44:19 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) (fail_nth: 4) 15:44:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:44:19 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:44:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x4000, 0x1}, 0xe) 15:44:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000018b, 0x0, 0x0, 0x0) [ 3212.859774] loop3: detected capacity change from 0 to 1024 [ 3212.866849] loop5: detected capacity change from 0 to 4 [ 3212.872865] EXT4-fs (loop5): unsupported descriptor size 0 [ 3212.881930] loop5: detected capacity change from 0 to 4 [ 3212.889095] EXT4-fs (loop5): unsupported descriptor size 0 [ 3212.889782] loop1: detected capacity change from 0 to 1024 [ 3212.904875] FAULT_INJECTION: forcing a failure. [ 3212.904875] name failslab, interval 1, probability 0, space 0, times 0 [ 3212.906599] CPU: 0 UID: 0 PID: 83939 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3212.906630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3212.906643] Call Trace: [ 3212.906652] [ 3212.906662] dump_stack_lvl+0xfa/0x120 [ 3212.906704] should_fail_ex+0x4d7/0x5e0 [ 3212.906755] should_failslab+0xc2/0x120 [ 3212.906782] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 3212.906821] ? __alloc_skb+0x2ab/0x370 [ 3212.906864] ? __alloc_skb+0x2ab/0x370 [ 3212.906884] __alloc_skb+0x2ab/0x370 [ 3212.906909] ? __pfx___alloc_skb+0x10/0x10 [ 3212.906953] ? rt_set_nexthop.constprop.0+0x5fc/0x1170 [ 3212.907009] alloc_skb_with_frags+0x8f/0x7c0 [ 3212.907067] sock_alloc_send_pskb+0x7cb/0x950 [ 3212.907107] ? xfrm_lookup_with_ifid+0x764/0x1990 [ 3212.907174] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 3212.907217] ? lock_acquire+0x15e/0x2f0 [ 3212.907266] ? xfrm_lookup_route+0x69/0x200 [ 3212.907322] raw_sendmsg+0x150b/0x3020 [ 3212.907394] ? __pfx_raw_sendmsg+0x10/0x10 [ 3212.907431] ? perf_trace_run_bpf_submit+0xef/0x180 [ 3212.907485] ? perf_trace_lock_acquire+0x3c2/0x700 [ 3212.907590] ? sock_has_perm+0x21c/0x2b0 [ 3212.907622] ? __pfx_sock_has_perm+0x10/0x10 [ 3212.907649] ? __might_fault+0xe0/0x190 [ 3212.907685] ? find_held_lock+0x2b/0x80 [ 3212.907712] ? __might_fault+0x138/0x190 [ 3212.907747] ? lock_release+0xc8/0x290 [ 3212.907784] ? __might_fault+0xe0/0x190 [ 3212.907837] ? __pfx_raw_sendmsg+0x10/0x10 [ 3212.907884] inet_sendmsg+0x121/0x150 [ 3212.907927] __sys_sendto+0x4a2/0x570 [ 3212.907974] ? __pfx___sys_sendto+0x10/0x10 [ 3212.908044] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 3212.908115] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3212.908152] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3212.908195] ? ksys_write+0x1a3/0x240 [ 3212.908234] ? __pfx_ksys_write+0x10/0x10 [ 3212.908286] __x64_sys_sendto+0xe1/0x1c0 [ 3212.908321] ? do_syscall_64+0x85/0x430 [ 3212.908354] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3212.908396] do_syscall_64+0xbf/0x430 [ 3212.908435] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3212.908458] RIP: 0033:0x7fcd1edb3b19 [ 3212.908476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3212.908497] RSP: 002b:00007fcd1c329188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 3212.908518] RAX: ffffffffffffffda RBX: 00007fcd1eec6f60 RCX: 00007fcd1edb3b19 [ 3212.908534] RDX: 0000000000000038 RSI: 0000000020000180 RDI: 0000000000000003 [ 3212.908547] RBP: 00007fcd1c3291d0 R08: 0000000020000000 R09: 0000000000000010 [ 3212.908561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3212.908573] R13: 00007ffe66e34d5f R14: 00007fcd1c329300 R15: 0000000000022000 [ 3212.908637] [ 3212.912274] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 15:44:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000018c, 0x0, 0x0, 0x0) 15:44:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x2}, 0xe) 15:44:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:44:19 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) (fail_nth: 5) 15:44:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:44:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x3}, 0xe) 15:44:19 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3213.086946] loop5: detected capacity change from 0 to 4 [ 3213.113596] EXT4-fs (loop5): unsupported descriptor size 0 [ 3213.129131] loop1: detected capacity change from 0 to 1024 [ 3213.663437] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3213.663437] [ 3213.696218] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3213.696218] [ 3213.958861] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3213.958861] 15:44:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000018d, 0x0, 0x0, 0x0) 15:44:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:44:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:44:30 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) (fail_nth: 6) 15:44:30 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x4}, 0xe) 15:44:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x410, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:44:30 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:44:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:44:30 executing program 4: ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x101}, {0xffffffffffffffff, 0x60c1}], 0x2, &(0x7f00000000c0), &(0x7f0000000140)={[0x1f]}, 0x8) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f0000000000)) [ 3224.588099] loop0: detected capacity change from 0 to 1024 [ 3224.603126] loop1: detected capacity change from 0 to 1024 [ 3224.623623] loop3: detected capacity change from 0 to 256 [ 3224.633568] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 3224.636722] loop5: detected capacity change from 0 to 4 [ 3224.652434] loop3: detected capacity change from 0 to 256 15:44:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000018e, 0x0, 0x0, 0x0) [ 3224.655778] EXT4-fs (loop5): unsupported descriptor size 0 [ 3224.659436] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 3224.674564] loop5: detected capacity change from 0 to 4 [ 3224.684200] EXT4-fs (loop5): unsupported descriptor size 0 15:44:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80002, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:44:30 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)={0x1, 0x100, 0x6, 0x3, 0x1f, 0xa3, 0x10c}, 0xc) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:44:30 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) (fail_nth: 7) 15:44:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:44:31 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3224.828143] loop3: detected capacity change from 0 to 1024 [ 3224.836108] loop5: detected capacity change from 0 to 4 [ 3224.851258] EXT4-fs (loop5): unsupported descriptor size 0 [ 3224.866546] loop5: detected capacity change from 0 to 4 [ 3224.874551] EXT4-fs (loop5): unsupported descriptor size 0 [ 3225.425744] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3225.425744] [ 3225.434341] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3225.434341] [ 3225.708409] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3225.708409] 15:44:42 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) pwritev2(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="1d9584be45b9dfebade89571777f2a8056bfe277110010bbfdcd8c3a1bbe1ada95f0859ab561f46438fcc568a1f08ec3b6a5c86ee91a6810c80008142b3d6c1d7fe09fb001582d61f5eb49466f0716d279e90be38f4d0a9dd0589235cb8d552f35a5ecfd5350794f94ad67cadd04d3db69c1263d67990d9ffe67ef90240df7345a811f8a906dd46ce69befa40b313a776a8fed5a06", 0x95}], 0x1, 0x9, 0x6, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x3f, 0x9b8, 0x8, 0x8, 0xffff}) 15:44:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80003, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:44:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x3fe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:44:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:44:42 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:44:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:44:42 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) (fail_nth: 8) 15:44:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000018f, 0x0, 0x0, 0x0) 15:44:42 executing program 4: sendmsg$OSF_MSG_ADD(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {0x5, 0x0, 0x5}, [{{0x254, 0x1, {{0x3, 0xd142}, 0x9, 0x7, 0x800, 0x7ff, 0x25, 'syz1\x00', "c2ab77bc09109e3a3ca682dd172043c9edb9401ea1977dbc1f4a82c566f3f28a", "5e07de1aef82716f5dfbf362874991a757b871f07ceb6cbfa3bd207dab7c5f42", [{0x8, 0x2, {0x2, 0x2}}, {0xe9, 0x1, {0x3, 0x4}}, {0x81, 0x1, {0x2, 0x80000000}}, {0x400, 0x2, {0x2, 0x200}}, {0x400, 0xfffb, {0x1, 0x9}}, {0x1, 0x400, {0x3, 0x8}}, {0x7, 0x3, {0x0, 0x8000}}, {0xff7f, 0x4, {0x3, 0xffff}}, {0x81, 0x2, {0x2, 0x8}}, {0x4000, 0x3f, {0x3}}, {0x9, 0x8000, {0x0, 0x400}}, {0x9, 0x400, {0x1, 0xdc48}}, {0x9, 0x5, {0x3}}, {0x800, 0xd39f, {0x0, 0x200}}, {0x4, 0x2, {0x0, 0x8a25}}, {0x0, 0x4, {0x0, 0x10001}}, {0x1, 0x8, {0x0, 0x5}}, {0x0, 0x400, {0x2, 0x1}}, {0x2, 0x1f, {0x2, 0xb0}}, {0x1f, 0x2, {0x1}}, {0x3, 0x101, {0x2}}, {0x9, 0x200, {0x0, 0x9}}, {0x8000, 0x8, {0x0, 0x6ee9dcc7}}, {0x80, 0xc6, {0x2, 0x3}}, {0x9c, 0x5, {0x1, 0x501d}}, {0x2a1, 0x7d5, {0x1}}, {0x100, 0x8, {0x2, 0x2}}, {0x3f, 0xffff, {0x2, 0x6}}, {0xdaf5, 0x20, {0x2, 0x6}}, {0x2, 0x4, {0x3, 0x3f}}, {0xfff7, 0x46, {0x6, 0xc6}}, {0x101, 0x2, {0x3, 0x8}}, {0x2, 0x2, {0x3, 0x4}}, {0xfff, 0x0, {0x2, 0x6}}, {0x5, 0xfff9, {0x0, 0x5}}, {0x5, 0x0, {0x2, 0x3}}, {0x8, 0x8, {0x2, 0x80000000}}, {0x64, 0x2, {0x3, 0x101}}, {0x7fff, 0x6, {0x2, 0x20}}, {0x3, 0x1, {0x2, 0x3}}]}}}]}, 0x268}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3236.016467] loop5: detected capacity change from 0 to 4 [ 3236.018478] loop3: detected capacity change from 0 to 1024 [ 3236.031157] EXT4-fs (loop5): unsupported descriptor size 0 [ 3236.036180] loop1: detected capacity change from 0 to 1024 [ 3236.045300] FAULT_INJECTION: forcing a failure. [ 3236.045300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3236.047314] CPU: 0 UID: 0 PID: 84481 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3236.047345] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3236.047358] Call Trace: [ 3236.047366] [ 3236.047376] dump_stack_lvl+0xfa/0x120 [ 3236.047420] should_fail_ex+0x4d7/0x5e0 [ 3236.047472] _copy_from_iter+0x1dc/0x1660 [ 3236.047521] ? lock_acquire+0x15e/0x2f0 [ 3236.047557] ? __virt_addr_valid+0x1c6/0x5d0 [ 3236.047584] ? find_held_lock+0x2b/0x80 [ 3236.047616] ? __pfx__copy_from_iter+0x10/0x10 [ 3236.047648] ? lock_release+0xc8/0x290 [ 3236.047697] ? __virt_addr_valid+0x100/0x5d0 [ 3236.047728] ? __check_object_size+0x579/0x880 [ 3236.047780] raw_sendmsg+0x198e/0x3020 [ 3236.047871] ? __pfx_raw_sendmsg+0x10/0x10 [ 3236.047917] ? perf_trace_run_bpf_submit+0xef/0x180 [ 3236.047971] ? perf_trace_lock_acquire+0x3c2/0x700 [ 3236.048069] ? sock_has_perm+0x21c/0x2b0 [ 3236.048099] ? __pfx_sock_has_perm+0x10/0x10 [ 3236.048127] ? __might_fault+0xe0/0x190 [ 3236.048162] ? find_held_lock+0x2b/0x80 [ 3236.048189] ? __might_fault+0x138/0x190 [ 3236.048224] ? lock_release+0xc8/0x290 [ 3236.048262] ? __might_fault+0xe0/0x190 [ 3236.048314] ? __pfx_raw_sendmsg+0x10/0x10 [ 3236.048361] inet_sendmsg+0x121/0x150 [ 3236.048404] __sys_sendto+0x4a2/0x570 [ 3236.048452] ? __pfx___sys_sendto+0x10/0x10 [ 3236.048522] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 3236.048593] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3236.048630] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3236.048673] ? ksys_write+0x1a3/0x240 [ 3236.048711] ? __pfx_ksys_write+0x10/0x10 [ 3236.048765] __x64_sys_sendto+0xe1/0x1c0 [ 3236.048801] ? do_syscall_64+0x85/0x430 [ 3236.048840] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3236.048895] do_syscall_64+0xbf/0x430 [ 3236.048934] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3236.048956] RIP: 0033:0x7fcd1edb3b19 [ 3236.048974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3236.048996] RSP: 002b:00007fcd1c329188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 3236.049017] RAX: ffffffffffffffda RBX: 00007fcd1eec6f60 RCX: 00007fcd1edb3b19 [ 3236.049032] RDX: 0000000000000038 RSI: 0000000020000180 RDI: 0000000000000003 [ 3236.049045] RBP: 00007fcd1c3291d0 R08: 0000000020000000 R09: 0000000000000010 [ 3236.049059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3236.049072] R13: 00007ffe66e34d5f R14: 00007fcd1c329300 R15: 0000000000022000 [ 3236.049135] [ 3236.049320] loop5: detected capacity change from 0 to 4 [ 3236.094810] loop0: detected capacity change from 0 to 1024 15:44:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000190, 0x0, 0x0, 0x0) [ 3236.116701] EXT4-fs (loop5): unsupported descriptor size 0 15:44:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:44:42 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) (fail_nth: 9) [ 3236.234753] loop5: detected capacity change from 0 to 4 [ 3236.250323] EXT4-fs (loop5): unsupported descriptor size 0 [ 3236.264700] loop5: detected capacity change from 0 to 4 [ 3236.272617] EXT4-fs (loop5): unsupported descriptor size 0 15:44:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000191, 0x0, 0x0, 0x0) [ 3236.357667] FAULT_INJECTION: forcing a failure. [ 3236.357667] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3236.359574] CPU: 0 UID: 0 PID: 84596 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3236.359606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3236.359619] Call Trace: [ 3236.359628] [ 3236.359639] dump_stack_lvl+0xfa/0x120 [ 3236.359684] should_fail_ex+0x4d7/0x5e0 [ 3236.359736] _copy_to_user+0x32/0xd0 [ 3236.359784] simple_read_from_buffer+0xe0/0x180 [ 3236.359834] proc_fail_nth_read+0x18a/0x240 [ 3236.359884] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 3236.359918] ? security_file_permission+0x22/0x90 [ 3236.359950] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 3236.359979] vfs_read+0x1eb/0xc70 [ 3236.360036] ? __pfx_vfs_read+0x10/0x10 [ 3236.360082] ? lock_release+0xc8/0x290 [ 3236.360134] ? __fget_files+0x20d/0x3b0 [ 3236.360204] ksys_read+0x121/0x240 [ 3236.360242] ? __pfx_ksys_read+0x10/0x10 [ 3236.360312] do_syscall_64+0xbf/0x430 [ 3236.360353] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3236.360376] RIP: 0033:0x7fcd1ed6669c [ 3236.360394] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3236.360415] RSP: 002b:00007fcd1c329170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3236.360436] RAX: ffffffffffffffda RBX: 0000000000000038 RCX: 00007fcd1ed6669c [ 3236.360451] RDX: 000000000000000f RSI: 00007fcd1c3291e0 RDI: 0000000000000005 [ 3236.360464] RBP: 00007fcd1c3291d0 R08: 0000000000000000 R09: 0000000000000010 [ 3236.360478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3236.360500] R13: 00007ffe66e34d5f R14: 00007fcd1c329300 R15: 0000000000022000 [ 3236.360565] [ 3236.863336] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3236.863336] [ 3236.877866] EXT4-fs warning (device loop0): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3236.877866] [ 3236.956795] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3236.956795] 15:44:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:44:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:44:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6702, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:44:53 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000192, 0x0, 0x0, 0x0) 15:44:53 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:44:53 executing program 4: r0 = add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)=']\x00') add_key$user(&(0x7f0000000080), &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000300)="e0c75b24713bd1d53d2629f955fce07c548b8b3040a8567b8bf77d91ae619fa074d87c6f5a83853f0ae78d1ee3950931ce575952f2b2055c6b91982bd33201036b5fd8446084491db442dd82aabeff20b3b4a0149c2654530b33340ed7bb2529de71cb17c12c7a58957e1528b051f309fa117da5e205b49bef2047cd10a1e7a6b6fbfc12155f35befdf7b1ee719c19d7600d0b58f459b79754d3fa710cd76dc24ffcebaf0039a55ddac96695b5dd76c53731cdd3fdb10d7281a1a873ba98d2e59ee0e4c0b273d7e0cfeceb8a9cb3174024e7d79ccb5737f34d9b3f3fa514a0aa806d3f2b4da5850e8c8e977515e290a70e292580217f6c503c0034e785e630", 0xff, r0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0xd8}], 0x82020, &(0x7f0000000140)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x7fff}}, {@dots}, {@dots}, {@fat=@dos1xfloppy}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@smackfsroot={'smackfsroot', 0x3d, '\xff\xff\xff\xff\xff\xff'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x30, 0x36, 0x38, 0x65, 0x0, 0x31, 0x39], 0x2d, [0x36, 0x34, 0x32], 0x2d, [0x62, 0x66, 0x30, 0x31], 0x2d, [0x61, 0x1, 0x65, 0x31], 0x2d, [0x62, 0x30, 0x64, 0x37, 0x61, 0x38, 0x38, 0x37]}}}]}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$clear(0x7, r3) bind$bt_l2cap(r2, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:44:53 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:44:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3247.048085] loop3: detected capacity change from 0 to 1024 [ 3247.050280] loop1: detected capacity change from 0 to 1024 15:44:53 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000193, 0x0, 0x0, 0x0) [ 3247.097264] loop5: detected capacity change from 0 to 4 [ 3247.106580] EXT4-fs (loop5): unsupported descriptor size 0 [ 3247.124199] loop5: detected capacity change from 0 to 4 15:44:53 executing program 4: r0 = dup(0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x12, r0, 0x9) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x7c01}, 0xfffffebb) [ 3247.139610] EXT4-fs (loop5): unsupported descriptor size 0 15:44:53 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000080)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x20000) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0xf154, @none, 0x4}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x3, 0xb9a6acf165ff4a82}, 0xe) fstat(r1, &(0x7f0000000140)) 15:44:53 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03020000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:44:53 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000194, 0x0, 0x0, 0x0) 15:44:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9f0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:44:53 executing program 4: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x8000, 0x2) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3247.321120] loop5: detected capacity change from 0 to 4 15:44:53 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03040000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:44:53 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000195, 0x0, 0x0, 0x0) [ 3247.347127] EXT4-fs (loop5): unsupported descriptor size 0 [ 3247.364041] loop5: detected capacity change from 0 to 4 [ 3247.373018] EXT4-fs (loop5): unsupported descriptor size 0 [ 3247.374913] loop0: detected capacity change from 0 to 163840 [ 3247.384424] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 3247.881425] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3247.881425] [ 3247.942449] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3247.942449] 15:45:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80005, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:45:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9f1, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:45:08 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000196, 0x0, 0x0, 0x0) 15:45:08 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)=[{&(0x7f00000000c0)={0xcc, 0x1b, 0x1, 0x70bd28, 0x25dfdbfb, "", [@generic="df3ecd3f86bf92b4463cca01b4ab92a8380302fa47a2990128c110cee11b11823560cda89e36246962da2435d50696ca94a4dc18e394fb59c381596ff7f2589380f69be496d532cbfaba69a0cfe07c654df85e8555a7a95473b70ee8f05e66637d2b1312cb8eab108eaef5f3cfa7eb5d1f87054e1ad50915b5264c6b0620c56bdf6b35a2460a71ad38d29aade2e46f72e82056a73361ec4fa3c463d138b94d816b59235f4438b5cfc97958416cd2bfdb330a68cc904dde0784438c48"]}, 0xcc}, {&(0x7f00000001c0)=ANY=[@ANYBLOB="280000001300100006000000fddbdf2516005880359069c3b3d0a349df9d055f7f718fc389050001"], 0x28}, {&(0x7f0000001040)={0x1088, 0x26, 0x200, 0x70bd28, 0x25dfdbfc, "", [@nested={0x1078, 0x45, 0x0, 0x1, [@typed={0x6, 0x78, 0x0, 0x0, @str='.\x00'}, @typed={0xc, 0x4f, 0x0, 0x0, @u64=0xeb57}, @generic="6ad98ca0191cc82889d83c5bbc970eab3b81999e144e9fb0a317bb22fbc34e53cc8c30256d0004b0c549aadf589d965145b653c5d62880119a93723b30c6d13b9bcdb674e002e3f4b3caa57f8db8bc9f", @typed={0x1004, 0x80, 0x0, 0x0, @binary="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"}, @typed={0xc, 0x55, 0x0, 0x0, @u64=0x1}]}]}, 0x1088}], 0x3, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20, 0x20008011}, 0xc841) r0 = fork() process_vm_readv(r0, &(0x7f0000002fc0)=[{&(0x7f0000000240)=""/166, 0xa6}, {&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000640)=""/18, 0x12}], 0x3, &(0x7f00000029c0)=[{&(0x7f0000000300)=""/111, 0x6f}, {&(0x7f0000000440)=""/185, 0x5a}, {&(0x7f0000000040)=""/60, 0x38}, {&(0x7f0000000540)=""/230, 0xe6}], 0x4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) [ 3262.677153] loop5: detected capacity change from 0 to 4 [ 3262.685753] EXT4-fs (loop5): unsupported descriptor size 0 sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)=[{&(0x7f00000000c0)={0xcc, 0x1b, 0x1, 0x70bd28, 0x25dfdbfb, "", [@generic="df3ecd3f86bf92b4463cca01b4ab92a8380302fa47a2990128c110cee11b11823560cda89e36246962da2435d50696ca94a4dc18e394fb59c381596ff7f2589380f69be496d532cbfaba69a0cfe07c654df85e8555a7a95473b70ee8f05e66637d2b1312cb8eab108eaef5f3cfa7eb5d1f87054e1ad50915b5264c6b0620c56bdf6b35a2460a71ad38d29aade2e46f72e82056a73361ec4fa3c463d138b94d816b59235f4438b5cfc97958416cd2bfdb330a68cc904dde0784438c48"]}, 0xcc}, {&(0x7f00000001c0)=ANY=[@ANYBLOB="280000001300100006000000fddbdf2516005880359069c3b3d0a349df9d055f7f718fc389050001"], 0x28}, {&(0x7f0000001040)={0x1088, 0x26, 0x200, 0x70bd28, 0x25dfdbfc, "", [@nested={0x1078, 0x45, 0x0, 0x1, [@typed={0x6, 0x78, 0x0, 0x0, @str='.\x00'}, @typed={0xc, 0x4f, 0x0, 0x0, @u64=0xeb57}, @generic="6ad98ca0191cc82889d83c5bbc970eab3b81999e144e9fb0a317bb22fbc34e53cc8c30256d0004b0c549aadf589d965145b653c5d62880119a93723b30c6d13b9bcdb674e002e3f4b3caa57f8db8bc9f", @typed={0x1004, 0x80, 0x0, 0x0, @binary="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"}, @typed={0xc, 0x55, 0x0, 0x0, @u64=0x1}]}]}, 0x1088}], 0x3, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x20, 0x20008011}, 0xc841) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000016c0), 0x14400, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r3, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001700)={0x0}, &(0x7f0000001740)=0xc) stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = inotify_init() r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r7, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r8, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r9, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001980)=[{{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000140)="4007f5994708c232c8c58fa05de2bea857a2aaf327ca0c2bb8d7ac85bfb77b8076da95e1897df271356124163976cebedd983a8e19fc01b2c46fcf550ebfabdb7b253509c3fd11f584fce863bdd885fe684b89b499d2c0cb012c443aa4cd878f6abe6d358eac578f1e06c2e9b86b3f32b104fb93e04c2e6384e3f1707def1bee2ee38d4a4b3b691f6da01b0c8e", 0x8d}, {&(0x7f0000000200)="cc9150a820fb19803b9b3a46647b6b0770259d9e21b785b45153d12fd5eac24ded6290b21407158a7efc5467f8e8dd63541fa0ba52ba7b3811fdc185084255bf084b3f944102221851595a9336a6b56719261e217e28fc9906cf0e45c6e875b0257faddadf9f9ff87b5a9274cdd529ea4a976fc6c8ec3a3a584301898d8ad6a0b7a4605d057b4769de90af84742445ba190aa86d96ab5af3d65b5b29a776ff2dede995e071ad2ceb1c69d93b09dcc4652f05e691ecfc96aff5317d858b757d4e9901bbcb9580241ca3646c08b28a84cba99125441aac3cd48b25c5c9a73e54aee5c30ee2", 0xe4}], 0x2, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40, 0x2400c800}}, {{&(0x7f0000000440)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001580)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="a72cdc3ea0c6f8a416212182b751ce707fcb656242927c396fee175e0c4403d2bd385179515972ecf56aec23a7ee5877b86170afeccfe4d89089a462bec6bb99ffe4d0ff99bcb73279010e340307d8fdb4bf53801f1dd03eda119c823fe0966eb779b419d0b06a0b88febf1a88997756988efd2c6e3682b110be43550f0ce755348f98250073ab0cbded9d0e823dc3b172efcdb25c4d51e1c74545b860a4d752f2f5f665729f211be454f627adc6b4d742590de2b4e9", 0xb6}], 0x2, &(0x7f0000001840)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, r1}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r2, r3, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, r5}}}, @rights={{0x24, 0x1, 0x1, [r6, 0xffffffffffffffff, r7, r8, r9]}}], 0x128, 0x40080}}], 0x2, 0x840) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r10, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:45:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6802, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:45:08 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) [ 3262.697958] loop5: detected capacity change from 0 to 4 [ 3262.703694] EXT4-fs (loop5): unsupported descriptor size 0 [ 3262.710149] loop1: detected capacity change from 0 to 1024 [ 3262.714116] loop3: detected capacity change from 0 to 1024 mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd", 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:45:08 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03080000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:45:08 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000197, 0x0, 0x0, 0x0) 15:45:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3262.783009] loop5: detected capacity change from 0 to 5 [ 3262.791431] EXT4-fs (loop5): unsupported descriptor size 0 15:45:09 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e030b0000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:45:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000198, 0x0, 0x0, 0x0) 15:45:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x1000000000000199, 0x0, 0x0, 0x0) [ 3262.908122] loop0: detected capacity change from 0 to 163840 [ 3262.916099] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 3263.006999] loop0: detected capacity change from 0 to 163840 [ 3263.008419] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 3263.530017] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3263.530017] [ 3263.596823] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3263.596823] 15:45:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:19 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:45:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80006, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:45:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:45:19 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e030e0000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:45:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6902, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:45:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0xce5d, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x7}, 0xe) 15:45:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000019a, 0x0, 0x0, 0x0) [ 3273.243477] loop3: detected capacity change from 0 to 1024 [ 3273.253841] loop5: detected capacity change from 0 to 6 [ 3273.259212] loop1: detected capacity change from 0 to 1024 [ 3273.268304] EXT4-fs (loop5): unsupported descriptor size 0 [ 3273.290717] loop5: detected capacity change from 0 to 6 15:45:19 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03380000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3273.310836] EXT4-fs (loop5): unsupported descriptor size 0 15:45:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000019b, 0x0, 0x0, 0x0) 15:45:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x1, @none, 0xfff}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x3e, @any, 0x0, 0x2}, 0xe) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x10040, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000140)={0x5, 0xfa}, 0x2) 15:45:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000019c, 0x0, 0x0, 0x0) 15:45:19 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:45:19 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03460000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:45:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x28100, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) r4 = syz_open_dev$vcsn(&(0x7f0000000140), 0x2, 0x400000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_SEND(r4, 0x40489426, &(0x7f00000001c0)={{r5}, 0x3, &(0x7f0000000180)=[0x7fff, 0x401, 0x1], 0x2, 0x5, [0x4, 0xffffffff, 0x1, 0x9]}) sendfile(r2, r3, 0x0, 0x100000000) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x200, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7f, 0x2}, 0xe) [ 3273.520659] loop5: detected capacity change from 0 to 7 [ 3273.558538] EXT4-fs (loop5): unsupported descriptor size 0 [ 3273.582825] loop5: detected capacity change from 0 to 7 15:45:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000019d, 0x0, 0x0, 0x0) [ 3273.597698] EXT4-fs (loop5): unsupported descriptor size 0 15:45:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1004, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3273.732155] loop5: detected capacity change from 0 to 8 [ 3273.739363] EXT4-fs (loop5): unsupported descriptor size 0 [ 3273.746417] loop5: detected capacity change from 0 to 8 [ 3273.754590] EXT4-fs (loop5): unsupported descriptor size 0 [ 3273.788310] loop0: detected capacity change from 0 to 163840 [ 3273.803454] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 3274.083614] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3274.083614] [ 3274.117784] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3274.117784] 15:45:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000019e, 0x0, 0x0, 0x0) 15:45:30 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03600000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:45:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80007, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:45:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:45:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:30 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:45:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0xff03, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:45:30 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_io_uring_complete(0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) connect$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x5, 0x1}, 0xe) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x6) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3284.343367] loop3: detected capacity change from 0 to 1024 [ 3284.358828] loop5: detected capacity change from 0 to 8 [ 3284.361456] loop1: detected capacity change from 0 to 1024 [ 3284.379465] EXT4-fs (loop5): unsupported descriptor size 0 [ 3284.396668] loop5: detected capacity change from 0 to 8 15:45:30 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03f40100000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3284.403609] EXT4-fs (loop5): unsupported descriptor size 0 15:45:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x100000000000019f, 0x0, 0x0, 0x0) 15:45:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x16a0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:30 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x2, @none, 0x0, 0x2}, 0xe) 15:45:30 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03e80300000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3284.540418] loop5: detected capacity change from 0 to 11 [ 3284.550097] EXT4-fs (loop5): unsupported descriptor size 0 [ 3284.566970] loop5: detected capacity change from 0 to 11 [ 3284.573883] EXT4-fs (loop5): unsupported descriptor size 0 15:45:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001a0, 0x0, 0x0, 0x0) 15:45:30 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000300)={0x9, 0xda49, 0x927a, 0x7f, 0xc1, 0x9f, 0x54}, 0xc) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/dev/char', 0x80000, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000280)=ANY=[@ANYBLOB="000000000100080018000000", @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r3, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) bind$bt_l2cap(r3, &(0x7f0000000340)={0x1f, 0x401, @none, 0x4}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f00000002c0)={0x401, 0x0, 0x3, 0x0, 0x4, 0x44, 0x2}, 0xc) connect$bt_l2cap(r1, &(0x7f0000000200)={0x1f, 0x35be, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x400, 0x2}, 0xe) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xfffffff7}}, './file0\x00'}) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000140)=0x1, &(0x7f0000000180)=0x4) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r5 = accept4$bt_l2cap(r0, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x80000) bind$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x2, @none, 0xfffd}, 0xe) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r6, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r6, 0x4b40, &(0x7f0000000380)=""/36) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r7, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) connect$bt_l2cap(r7, &(0x7f0000000240)={0x1f, 0x9, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0xf5, 0x2}, 0xe) 15:45:30 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:45:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x19b9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3284.772434] loop5: detected capacity change from 0 to 12 [ 3284.782184] EXT4-fs (loop5): unsupported descriptor size 0 15:45:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001a1, 0x0, 0x0, 0x0) [ 3284.805234] loop5: detected capacity change from 0 to 12 [ 3284.815128] EXT4-fs (loop5): unsupported descriptor size 0 [ 3285.088844] loop0: detected capacity change from 0 to 163840 [ 3285.095378] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 3285.190160] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3285.190160] [ 3285.245805] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3285.245805] 15:45:40 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000b00000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:45:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80008, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:45:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:45:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001a2, 0x0, 0x0, 0x0) 15:45:40 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:45:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x100000, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:45:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:40 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x8, 0xb0, 0x9}) r3 = ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) poll(&(0x7f0000000200)=[{r1, 0x4000}, {r3, 0x14a}, {r1, 0x80}, {r0, 0xa15fcb352d375c3f}], 0x4, 0x3f5d) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r5 = getpid() r6 = pidfd_open(r5, 0x0) copy_file_range(r6, 0x0, r4, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000180)={0x0}) r8 = syz_io_uring_setup(0x3cfc, &(0x7f0000000240)={0x0, 0x20000000, 0x0, 0x0, 0x3}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) io_uring_register$IORING_REGISTER_PROBE(r8, 0x8, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000080)={r7, 0x2, r8, 0xa0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r7, 0x0, r0, 0x7, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r7, 0x0, 0xffffffffffffffff, 0x6ee}) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x400002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={r7, 0x1, r9, 0x9}) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r10, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3294.385673] loop3: detected capacity change from 0 to 1024 [ 3294.421404] loop5: detected capacity change from 0 to 16 [ 3294.436222] loop1: detected capacity change from 0 to 1024 [ 3294.438543] EXT4-fs (loop5): unsupported descriptor size 0 [ 3294.452351] loop5: detected capacity change from 0 to 16 [ 3294.458211] EXT4-fs (loop5): unsupported descriptor size 0 15:45:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001a3, 0x0, 0x0, 0x0) 15:45:40 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000e00000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:45:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:40 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942", 0x62}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3294.606209] loop5: detected capacity change from 0 to 16 15:45:40 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3294.613071] EXT4-fs (loop5): unsupported descriptor size 0 [ 3295.258934] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3295.258934] [ 3295.264380] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3295.264380] 15:45:50 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03003800000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:45:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:45:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80009, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:45:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:50 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x40, @any, 0x7, 0x1}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)=0x8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101082, 0x0) close_range(r3, r0, 0x2) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r4, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r5, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) close_range(r4, r5, 0x0) pread64(r2, &(0x7f0000000080)=""/43, 0x2b, 0x4) 15:45:50 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d65", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:45:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001a4, 0x0, 0x0, 0x0) 15:45:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3304.706248] loop1: detected capacity change from 0 to 1024 [ 3304.709404] loop3: detected capacity change from 0 to 1024 [ 3304.714300] loop5: detected capacity change from 0 to 18 [ 3304.732371] EXT4-fs (loop5): unsupported descriptor size 0 15:45:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001a5, 0x0, 0x0, 0x0) [ 3304.755444] loop5: detected capacity change from 0 to 18 [ 3304.777904] EXT4-fs (loop5): unsupported descriptor size 0 15:45:51 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03004600000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:45:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:51 executing program 4: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x20}}, './file0\x00'}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0xb2, @empty, 0x8}, 0x1c) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:45:51 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001a6, 0x0, 0x0, 0x0) 15:45:51 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d65", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3305.008414] loop5: detected capacity change from 0 to 19 [ 3305.016178] EXT4-fs (loop5): unsupported descriptor size 0 [ 3305.026321] loop5: detected capacity change from 0 to 19 [ 3305.032094] EXT4-fs (loop5): unsupported descriptor size 0 15:45:51 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03006000000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:45:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:45:51 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000080)={0x1, "64528f"}, 0x6) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r3, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) ioctl$int_out(r3, 0x0, &(0x7f00000000c0)) [ 3305.185402] loop5: detected capacity change from 0 to 31 [ 3305.204579] EXT4-fs (loop5): unsupported descriptor size 0 [ 3305.229008] loop5: detected capacity change from 0 to 31 [ 3305.243695] EXT4-fs (loop5): unsupported descriptor size 0 [ 3305.534577] EXT4-fs warning (device loop1): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3305.534577] [ 3305.581835] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3305.581835] 15:46:02 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001a7, 0x0, 0x0, 0x0) [ 3315.996283] loop1: detected capacity change from 0 to 1024 15:46:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="040000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:46:02 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r3, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0, 0x1080}, {r1, 0x12}, {r2, 0x100}, {r3, 0x40}], 0x4, &(0x7f0000000080)={r4, r5+10000000}, &(0x7f00000000c0)={[0x8000]}, 0x8) 15:46:02 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e0303e800000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:46:02 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d65", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3316.011842] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 [ 3316.023189] loop3: detected capacity change from 0 to 1024 15:46:02 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001a8, 0x0, 0x0, 0x0) [ 3316.056919] loop0: detected capacity change from 0 to 1024 [ 3316.057568] loop5: detected capacity change from 0 to 32 [ 3316.062654] EXT4-fs (loop5): unsupported descriptor size 0 [ 3316.065123] EXT4-fs (loop0): inodes count not valid: 4 vs 32 [ 3316.066144] loop5: detected capacity change from 0 to 32 [ 3316.068314] EXT4-fs (loop5): unsupported descriptor size 0 15:46:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3316.078585] loop0: detected capacity change from 0 to 1024 [ 3316.081561] EXT4-fs (loop0): inodes count not valid: 4 vs 32 15:46:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:46:02 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000001c0)={@local}, 0x14) 15:46:02 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e0301f400000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="050000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3316.152110] loop5: detected capacity change from 0 to 33 [ 3316.162195] EXT4-fs (loop5): unsupported descriptor size 0 [ 3316.168472] loop5: detected capacity change from 0 to 33 [ 3316.173209] EXT4-fs (loop5): unsupported descriptor size 0 [ 3316.180431] loop1: detected capacity change from 0 to 1024 15:46:02 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001a9, 0x0, 0x0, 0x0) [ 3316.206822] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 15:46:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3316.257246] loop5: detected capacity change from 0 to 48 [ 3316.262271] EXT4-fs (loop5): unsupported descriptor size 0 [ 3316.268942] loop5: detected capacity change from 0 to 48 [ 3316.272784] EXT4-fs (loop5): unsupported descriptor size 0 [ 3316.276863] loop0: detected capacity change from 0 to 1024 [ 3316.287217] EXT4-fs (loop0): inodes count not valid: 5 vs 32 [ 3316.291148] loop0: detected capacity change from 0 to 1024 [ 3316.295999] EXT4-fs (loop0): inodes count not valid: 5 vs 32 [ 3316.892264] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3316.892264] 15:46:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000b, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1b0000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa016, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:46:13 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9", 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:46:13 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001aa, 0x0, 0x0, 0x0) 15:46:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:46:13 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) shutdown(r1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:46:13 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03001001000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3327.085114] loop0: detected capacity change from 0 to 1024 [ 3327.086220] loop3: detected capacity change from 0 to 1024 [ 3327.095226] EXT4-fs (loop0): inodes count not valid: 27 vs 32 [ 3327.103072] loop0: detected capacity change from 0 to 1024 [ 3327.105966] EXT4-fs (loop0): inodes count not valid: 27 vs 32 [ 3327.114117] loop5: detected capacity change from 0 to 80 [ 3327.119897] loop1: detected capacity change from 0 to 1024 [ 3327.121833] EXT4-fs (loop5): unsupported descriptor size 0 15:46:13 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/icmp6\x00') bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0xc9f, @any, 0xfffe, 0x2}, 0xe) [ 3327.142333] loop5: detected capacity change from 0 to 80 15:46:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1c0000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3327.144306] EXT4-fs warning (device loop1): read_mmp_block:114: Error -117 while reading MMP block 64 [ 3327.151043] EXT4-fs (loop5): unsupported descriptor size 0 15:46:13 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03004003000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:13 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001ab, 0x0, 0x0, 0x0) 15:46:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb919, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3327.232480] loop0: detected capacity change from 0 to 1024 15:46:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3327.257912] EXT4-fs (loop0): inodes count not valid: 28 vs 32 15:46:13 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x0, 0x1}, 0xe) [ 3327.268213] loop0: detected capacity change from 0 to 1024 [ 3327.275726] EXT4-fs (loop0): inodes count not valid: 28 vs 32 15:46:13 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000008000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3327.304973] loop5: detected capacity change from 0 to 92 [ 3327.312810] loop1: detected capacity change from 0 to 1024 [ 3327.318829] EXT4-fs (loop5): unsupported descriptor size 0 [ 3327.332466] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3327.334816] EXT4-fs (loop1): get root inode failed [ 3327.335223] EXT4-fs (loop1): mount failed [ 3327.336876] loop5: detected capacity change from 0 to 92 [ 3327.346849] EXT4-fs (loop5): unsupported descriptor size 0 [ 3327.950978] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3327.950978] 15:46:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1d0000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:46:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:46:24 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9", 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:46:24 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000040)="b25a6f355b6a462c67644c297e7089e00ad1c41056fe0c30725f0b9d5f0f102007303ed1ecb6f3643e4666138ca9ec1f2b96aaafe8fdba09df35", 0x3a}, {0x0}, {&(0x7f0000000140)="cc71f0ffdcd333a2939df8aa44fe146ae837edcebc2df8d2aaa84c3bdb130a86f561544890b805733af9485289a14b5c666979d30632de99e851160bc635782b7966581ba698a939a8ffd70dc6737fadcb3dc67ef8392e052016ee27904c5521baeea5c5e5447ce3f842983bdbb61f8464bd78b9d580a77c68a0c2271388457cd89a8bafa52bb30a5059e00952a2c64d1f55dbd9287a30cb0c42ec10aa326da894a18e4017c86e49a401c22dfd06592cb3d76ddb6dee3dbf7f62d4f36a9e27b1dfbf77d37fdb7635d03c3d759fb62490fd", 0xd1}], 0x3, 0x0, 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x1f, @any, 0xffff, 0x1}, 0xe) dup(r0) 15:46:24 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000110000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:24 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001ac, 0x0, 0x0, 0x0) [ 3338.632879] loop5: detected capacity change from 0 to 118 [ 3338.650176] EXT4-fs (loop5): unsupported descriptor size 0 [ 3338.657309] loop1: detected capacity change from 0 to 1024 [ 3338.661299] loop3: detected capacity change from 0 to 1024 [ 3338.662660] loop5: detected capacity change from 0 to 118 [ 3338.667160] loop0: detected capacity change from 0 to 1024 [ 3338.672248] EXT4-fs (loop5): unsupported descriptor size 0 [ 3338.685848] EXT4-fs (loop0): inodes count not valid: 29 vs 32 [ 3338.697437] loop0: detected capacity change from 0 to 1024 [ 3338.706556] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3338.708230] EXT4-fs (loop0): inodes count not valid: 29 vs 32 [ 3338.724193] EXT4-fs (loop1): get root inode failed [ 3338.725003] EXT4-fs (loop1): mount failed 15:46:24 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @any, 0x8804, 0x2}, 0xe) 15:46:24 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001ad, 0x0, 0x0, 0x0) 15:46:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:46:25 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000340000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="240000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3338.838061] loop5: detected capacity change from 0 to 120 15:46:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3338.863603] EXT4-fs (loop5): unsupported descriptor size 0 15:46:25 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9", 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3338.908045] loop0: detected capacity change from 0 to 1024 [ 3338.923236] EXT4-fs (loop0): inodes count not valid: 36 vs 32 15:46:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001ae, 0x0, 0x0, 0x0) [ 3338.950135] loop0: detected capacity change from 0 to 1024 [ 3338.962142] loop1: detected capacity change from 0 to 1024 [ 3338.966079] EXT4-fs (loop0): inodes count not valid: 36 vs 32 15:46:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf009, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:46:25 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x6) [ 3339.019367] loop5: detected capacity change from 0 to 120 [ 3339.026917] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3339.031744] EXT4-fs (loop5): unsupported descriptor size 0 [ 3339.041212] loop5: detected capacity change from 0 to 120 [ 3339.046471] EXT4-fs (loop5): unsupported descriptor size 0 [ 3339.048223] EXT4-fs (loop1): get root inode failed [ 3339.049068] EXT4-fs (loop1): mount failed [ 3339.546303] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3339.546303] 15:46:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80010, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="430000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:34 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c575", 0x6f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:46:34 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000010000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf109, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:46:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001af, 0x0, 0x0, 0x0) 15:46:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {0x0, 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:46:34 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x81, @any, 0x8001, 0x2}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x8, @none, 0x8, 0x1}, 0xe) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000140)={0x0, 0x0, {0x5f7, @usage=0x2, 0x0, 0x9, 0xb1a8, 0x100000001, 0x3, 0x7ff, 0x0, @usage=0x3, 0x10001, 0x3, [0x1ff, 0xff, 0x200, 0x9, 0x2, 0xffff]}, {0x4, @usage=0xfe, 0x0, 0xd93, 0x3, 0x5, 0x3ff, 0xffffffffffffffc0, 0x10, @struct={0xa82}, 0x1, 0x2, [0x3, 0x20, 0x0, 0xfffffffffffffffe, 0x7fffffff, 0x2fb5]}, {0xbb0, @struct={0x7ff, 0xfb81}, 0x0, 0x88d, 0x3, 0x1, 0xfff, 0x3ff, 0x404, @usage=0x5, 0x5, 0x1cd4, [0x4a, 0xff, 0x100000001, 0x1, 0x200, 0x9]}, {0xffff, 0x72c, 0x2}}) [ 3348.601114] loop3: detected capacity change from 0 to 1024 [ 3348.618232] loop1: detected capacity change from 0 to 1024 [ 3348.632280] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3348.634174] loop0: detected capacity change from 0 to 1024 [ 3348.635993] EXT4-fs (loop1): get root inode failed [ 3348.636375] EXT4-fs (loop1): mount failed [ 3348.642720] EXT4-fs (loop0): inodes count not valid: 67 vs 32 [ 3348.650433] loop5: detected capacity change from 0 to 120 [ 3348.654107] loop0: detected capacity change from 0 to 1024 [ 3348.666326] EXT4-fs (loop5): unsupported descriptor size 0 [ 3348.666343] EXT4-fs (loop0): inodes count not valid: 67 vs 32 [ 3348.675430] loop5: detected capacity change from 0 to 120 [ 3348.687466] EXT4-fs (loop5): unsupported descriptor size 0 15:46:34 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000020000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {0x0, 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3348.734152] loop1: detected capacity change from 0 to 1024 15:46:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="4e0000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3348.776599] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3348.780159] EXT4-fs (loop1): get root inode failed [ 3348.780674] EXT4-fs (loop1): mount failed 15:46:35 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001b0, 0x0, 0x0, 0x0) 15:46:35 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000040000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:35 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) 15:46:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf500, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3348.879476] loop5: detected capacity change from 0 to 122 [ 3348.882055] EXT4-fs (loop5): unsupported descriptor size 0 15:46:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {0x0, 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3348.893713] loop5: detected capacity change from 0 to 122 [ 3348.899383] EXT4-fs (loop5): unsupported descriptor size 0 [ 3348.906958] loop0: detected capacity change from 0 to 1024 [ 3348.920941] EXT4-fs (loop0): inodes count not valid: 78 vs 32 [ 3348.936323] loop0: detected capacity change from 0 to 1024 [ 3348.945766] EXT4-fs (loop0): inodes count not valid: 78 vs 32 [ 3349.472707] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3349.472707] 15:46:44 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c575", 0x6f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:46:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:46:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00), 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:46:44 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000080000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="002000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:44 executing program 4: lseek(0xffffffffffffffff, 0x2, 0x4) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x5, @any, 0x4, 0x1}, 0xe) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x2a080, 0x0) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x3, @any, 0x40, 0x2}, 0xe) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x5, @any, 0x2, 0x1}, 0xe) 15:46:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80024, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:44 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001b1, 0x0, 0x0, 0x0) [ 3358.019182] loop5: detected capacity change from 0 to 127 [ 3358.023935] loop3: detected capacity change from 0 to 1024 [ 3358.025361] EXT4-fs (loop5): unsupported descriptor size 0 [ 3358.030937] loop5: detected capacity change from 0 to 127 [ 3358.035200] EXT4-fs (loop5): unsupported descriptor size 0 15:46:44 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x404, @none, 0x4}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3358.059614] loop1: detected capacity change from 0 to 1024 [ 3358.061246] loop0: detected capacity change from 0 to 1024 [ 3358.071580] EXT4-fs (loop0): inodes count not valid: 8192 vs 32 15:46:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3358.086904] loop0: detected capacity change from 0 to 1024 [ 3358.093370] EXT4-fs (loop0): inodes count not valid: 8192 vs 32 [ 3358.094733] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3358.103327] EXT4-fs (loop1): get root inode failed [ 3358.104362] EXT4-fs (loop1): mount failed 15:46:44 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001b2, 0x0, 0x0, 0x0) 15:46:44 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e030000000b0000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:44 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0xd9, @none, 0x4}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x0, 0x1}, 0xe) creat(&(0x7f0000000080)='./file0\x00', 0x10c) [ 3358.206376] loop5: detected capacity change from 0 to 127 15:46:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200200000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3358.237089] EXT4-fs (loop5): unsupported descriptor size 0 [ 3358.263078] loop5: detected capacity change from 0 to 127 [ 3358.274091] EXT4-fs (loop5): unsupported descriptor size 0 [ 3358.334521] loop0: detected capacity change from 0 to 1024 [ 3358.354776] EXT4-fs (loop0): inodes count not valid: 544 vs 32 [ 3358.364911] loop0: detected capacity change from 0 to 1024 [ 3358.375411] EXT4-fs (loop0): inodes count not valid: 544 vs 32 [ 3358.893163] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3358.893163] 15:46:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80027, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:54 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001b3, 0x0, 0x0, 0x0) 15:46:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200300000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:46:54 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e030000000e0000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:46:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00), 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:46:54 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x0, @multicast1}}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f0000000440)=""/162, 0xa2}], 0x3, &(0x7f0000000540)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}, {{&(0x7f0000000600), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000000680)=""/178, 0xb2}, {&(0x7f0000000740)=""/121, 0x79}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/245, 0xf5}, {&(0x7f00000018c0)=""/254, 0xfe}, {&(0x7f00000019c0)=""/193, 0xc1}], 0x6, &(0x7f0000001b40)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd0}}, {{&(0x7f0000001c40)=@abs, 0x6e, &(0x7f0000003040)=[{&(0x7f0000001cc0)=""/163, 0xa3}, {&(0x7f0000001d80)=""/142, 0x8e}, {&(0x7f0000001e40)=""/16, 0x10}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000002e80)=""/233, 0xe9}, {&(0x7f0000002f80)=""/86, 0x56}, {&(0x7f0000003000)=""/32, 0x20}], 0x7}}, {{&(0x7f00000030c0), 0x6e, &(0x7f0000003580)=[{&(0x7f0000003140)=""/139, 0x8b}, {&(0x7f0000003200)=""/88, 0x58}, {&(0x7f0000003280)=""/237, 0xed}, {&(0x7f0000003380)=""/208, 0xd0}, {&(0x7f0000003480)=""/208, 0xd0}], 0x5, &(0x7f0000003600)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}, {{&(0x7f00000036c0)=@abs, 0x6e, &(0x7f0000003a00)=[{&(0x7f0000003740)=""/189, 0xbd}, {&(0x7f0000003800)=""/198, 0xc6}, {&(0x7f0000003900)=""/202, 0xca}], 0x3, &(0x7f0000003a40)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f0000003b00)=@abs, 0x6e, &(0x7f0000003bc0)=[{&(0x7f0000003b80)=""/23, 0x17}], 0x1, &(0x7f0000003c00)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000003cc0), 0x6e, &(0x7f0000003f80)=[{&(0x7f0000003d40)=""/84, 0x54}, {&(0x7f0000003dc0)=""/177, 0xb1}, {&(0x7f0000003e80)=""/241, 0xf1}], 0x3, &(0x7f0000003fc0)=[@cred={{0x1c}}], 0x20}}], 0x7, 0x2000, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r4, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r5 = accept4$bt_l2cap(r4, &(0x7f0000000240)={0x1f, 0x0, @fixed}, &(0x7f0000000080)=0xe, 0x800) getsockopt$bt_hci(r5, 0x0, 0x2, &(0x7f0000000140)=""/203, &(0x7f00000000c0)=0xcb) readv(r1, &(0x7f00000074c0)=[{&(0x7f00000041c0)=""/161, 0xa1}, {&(0x7f0000004280)=""/189, 0xbd}, {&(0x7f0000004340)=""/4096, 0x1000}, {&(0x7f0000005340)=""/156, 0x9c}, {&(0x7f0000005400)=""/4096, 0x1000}, {&(0x7f0000006400)=""/131, 0x83}, {&(0x7f0000000280)=""/28, 0x1c}, {&(0x7f00000064c0)=""/4096, 0x1000}], 0x8) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$TUNGETDEVNETNS(r6, 0x54e3, 0x0) 15:46:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:46:54 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x10}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c575", 0x6f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3368.641223] loop5: detected capacity change from 0 to 127 [ 3368.648802] EXT4-fs (loop5): unsupported descriptor size 0 [ 3368.660712] loop5: detected capacity change from 0 to 127 [ 3368.665861] loop0: detected capacity change from 0 to 1024 [ 3368.666643] EXT4-fs (loop5): unsupported descriptor size 0 [ 3368.670563] loop3: detected capacity change from 0 to 1024 [ 3368.671990] loop1: detected capacity change from 0 to 1024 [ 3368.677200] EXT4-fs (loop0): inodes count not valid: 800 vs 32 15:46:54 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0xf217, @none, 0x800, 0x1}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x40, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x0, 0x1}, 0xe) [ 3368.693305] loop0: detected capacity change from 0 to 1024 [ 3368.704782] EXT4-fs (loop0): inodes count not valid: 800 vs 32 15:46:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3368.712297] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3368.718523] EXT4-fs (loop1): get root inode failed [ 3368.719357] EXT4-fs (loop1): mount failed 15:46:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200400000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3368.785905] loop5: detected capacity change from 0 to 512 [ 3368.791896] EXT4-fs (loop5): unsupported descriptor size 0 15:46:55 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3368.810027] loop5: detected capacity change from 0 to 512 15:46:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00), 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3368.812850] EXT4-fs (loop5): unsupported descriptor size 0 15:46:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001b4, 0x0, 0x0, 0x0) 15:46:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:46:55 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03421470220000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3368.871052] loop5: detected capacity change from 0 to 1024 [ 3368.881102] EXT4-fs (loop5): unsupported descriptor size 0 [ 3368.892014] loop5: detected capacity change from 0 to 1024 [ 3368.902560] EXT4-fs (loop5): unsupported descriptor size 0 [ 3368.902584] loop0: detected capacity change from 0 to 1024 [ 3368.915783] EXT4-fs (loop0): inodes count not valid: 1056 vs 32 [ 3368.918090] loop1: detected capacity change from 0 to 1024 [ 3368.933451] loop0: detected capacity change from 0 to 1024 [ 3368.934772] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3368.938877] EXT4-fs (loop1): get root inode failed [ 3368.940024] EXT4-fs (loop1): mount failed [ 3368.944392] EXT4-fs (loop0): inodes count not valid: 1056 vs 32 [ 3369.555569] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3369.555569] 15:47:06 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x40, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 15:47:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80043, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:06 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:47:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f000000000000040020000000", 0x20, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:47:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:47:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001b5, 0x0, 0x0, 0x0) 15:47:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200500000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:06 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000380000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3380.137369] loop5: detected capacity change from 0 to 1792 [ 3380.144222] EXT4-fs (loop5): unsupported descriptor size 0 [ 3380.150117] loop5: detected capacity change from 0 to 1792 [ 3380.157355] EXT4-fs (loop5): unsupported descriptor size 0 [ 3380.157892] loop3: detected capacity change from 0 to 1024 [ 3380.169100] loop0: detected capacity change from 0 to 1024 [ 3380.171439] loop1: detected capacity change from 0 to 1024 [ 3380.183639] EXT4-fs (loop0): inodes count not valid: 1312 vs 32 15:47:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001b6, 0x0, 0x0, 0x0) [ 3380.204307] loop0: detected capacity change from 0 to 1024 [ 3380.216328] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 3380.219462] EXT4-fs (loop0): inodes count not valid: 1312 vs 32 15:47:06 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03765b00380000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:47:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:47:06 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x4, 0x1}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x7f, 0x2}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3380.273642] loop5: detected capacity change from 0 to 2048 15:47:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001b7, 0x0, 0x0, 0x0) [ 3380.299782] EXT4-fs (loop5): unsupported descriptor size 0 15:47:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200600000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3380.308436] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 15:47:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00), 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:47:06 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03227014420000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:47:06 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3380.417163] loop0: detected capacity change from 0 to 1024 [ 3380.426609] EXT4-fs (loop0): inodes count not valid: 1568 vs 32 [ 3380.437370] loop1: detected capacity change from 0 to 1024 [ 3380.438824] loop0: detected capacity change from 0 to 1024 [ 3380.443305] EXT4-fs (loop0): inodes count not valid: 1568 vs 32 [ 3380.456380] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3380.460972] EXT4-fs (loop1): get root inode failed [ 3380.461494] EXT4-fs (loop1): mount failed [ 3381.042331] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3381.042331] 15:47:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80060, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001b8, 0x0, 0x0, 0x0) 15:47:16 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000460000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:47:16 executing program 4: r0 = syz_io_uring_setup(0x5a2b, &(0x7f0000003a00)={0x0, 0x0, 0x0, 0x200, 0x110}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000003a80), &(0x7f0000003ac0)) r1 = dup(r0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x22, &(0x7f0000001680)=[{&(0x7f0000000580)=""/199, 0xc7}], 0x1) r2 = signalfd4(r1, &(0x7f0000000000)={[0x2]}, 0x8, 0x80000) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/40, 0x28}], 0x1) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r3, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r3, 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r4, &(0x7f0000000100)={0x1f, 0x40, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x0, 0x1}, 0xe) 15:47:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:47:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200700000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00), 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:47:16 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3389.948270] loop3: detected capacity change from 0 to 1024 [ 3389.949989] loop0: detected capacity change from 0 to 1024 [ 3389.954207] EXT4-fs (loop0): inodes count not valid: 1824 vs 32 [ 3389.956784] loop0: detected capacity change from 0 to 1024 [ 3389.958074] EXT4-fs (loop0): inodes count not valid: 1824 vs 32 15:47:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200800000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3390.011316] loop5: detected capacity change from 0 to 8192 [ 3390.015416] loop1: detected capacity change from 0 to 1024 [ 3390.015998] loop0: detected capacity change from 0 to 1024 [ 3390.025697] EXT4-fs (loop0): inodes count not valid: 2080 vs 32 [ 3390.033391] EXT4-fs (loop5): unsupported descriptor size 0 [ 3390.034347] loop0: detected capacity change from 0 to 1024 [ 3390.038118] EXT4-fs (loop0): inodes count not valid: 2080 vs 32 [ 3390.043659] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3390.053781] EXT4-fs (loop1): get root inode failed [ 3390.054645] EXT4-fs (loop1): mount failed [ 3390.057364] loop5: detected capacity change from 0 to 8192 [ 3390.074940] EXT4-fs (loop5): unsupported descriptor size 0 15:47:16 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000600000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:47:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200900000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001b9, 0x0, 0x0, 0x0) 15:47:16 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) io_setup(0x8d, &(0x7f00000003c0)=0x0) io_pgetevents(r1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500), 0x8}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r3, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000240)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xf47, r2, &(0x7f0000000000)="c269c1ecaf999bfc6fa30b17c225e3d3d2155527f051251f238c4c3022e8f8c31cd10ac85d3f512909ce5c182956d4a366bc26cf057b8cc026ac71072b3296edad2962dc19d8aaad564ee33fc9499610f75a8bf252ed18f5057ca9c5b506c2355c3200cd592b099241e9e0fe03d5ef3af2bbbc269821b4a0954b46191373b1c5d6fc16618d25bd6a77a6f9158c39e0d1091ff31b17b84c4c26b2b59ef598ed71e6d14640b840572cdfda93fff42f9f3a585f8fe676c006b30aedaf345b82b07a73", 0xc1, 0x5bc, 0x0, 0x3, r3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000180)="991e6a2829a4203d6d7d53a30d89245f1769c144ca126f6c3c643b425b3225f2d6ec91b1e1ee419a2d69743126cd09ae7b0b95398e9bb370bc6f7e30df03322112f2931ea05afc54f92d0728a6c3", 0x4e, 0x401, 0x0, 0x2}]) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3390.188315] loop0: detected capacity change from 0 to 1024 [ 3390.196031] EXT4-fs (loop0): inodes count not valid: 2336 vs 32 [ 3390.231261] loop0: detected capacity change from 0 to 1024 [ 3390.236802] EXT4-fs (loop0): inodes count not valid: 2336 vs 32 [ 3390.809209] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3390.809209] 15:47:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001ba, 0x0, 0x0, 0x0) 15:47:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:25 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:47:25 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x1, 0x1}, 0xe) 15:47:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:47:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00), 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:47:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200a00000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:25 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e0338005b760000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3399.392148] loop0: detected capacity change from 0 to 1024 [ 3399.407889] EXT4-fs (loop0): inodes count not valid: 2592 vs 32 [ 3399.412186] loop3: detected capacity change from 0 to 1025 [ 3399.424911] loop5: detected capacity change from 0 to 28799 [ 3399.434025] loop0: detected capacity change from 0 to 1024 [ 3399.434922] loop1: detected capacity change from 0 to 1024 [ 3399.443840] EXT4-fs (loop5): unsupported descriptor size 0 [ 3399.445340] EXT4-fs (loop0): inodes count not valid: 2592 vs 32 [ 3399.449089] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3399.451134] EXT4-fs (loop1): get root inode failed [ 3399.451603] EXT4-fs (loop1): mount failed 15:47:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001bb, 0x0, 0x0, 0x0) [ 3399.472459] loop5: detected capacity change from 0 to 28799 [ 3399.485931] EXT4-fs (loop5): unsupported descriptor size 0 15:47:25 executing program 4: mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x7ff, 0xc8, 0x4) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @any, 0x0, 0x2}, 0xe) 15:47:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655f", 0x10, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:47:25 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000003e80000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:47:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200b00000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf0ffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:47:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001bc, 0x0, 0x0, 0x0) [ 3399.644451] loop5: detected capacity change from 0 to 30847 [ 3399.648368] loop1: detected capacity change from 0 to 1024 [ 3399.654788] loop0: detected capacity change from 0 to 1024 [ 3399.662181] EXT4-fs (loop0): inodes count not valid: 2848 vs 32 15:47:25 executing program 4: fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00', &(0x7f0000000040)=""/85, 0x55) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000000c0), 0x7bfb, 0x1c1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 3399.673775] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3399.678701] EXT4-fs (loop1): get root inode failed [ 3399.679107] EXT4-fs (loop1): mount failed [ 3399.682552] EXT4-fs (loop5): unsupported descriptor size 0 [ 3399.684236] loop0: detected capacity change from 0 to 1024 [ 3399.689469] EXT4-fs (loop0): inodes count not valid: 2848 vs 32 15:47:25 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3399.707574] loop5: detected capacity change from 0 to 30847 [ 3399.727130] EXT4-fs (loop5): unsupported descriptor size 0 [ 3400.284015] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3400.284015] 15:47:35 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001bd, 0x0, 0x0, 0x0) 15:47:35 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000001f40000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:47:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655f", 0x10, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:47:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200d00000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:47:35 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x9, 0x9}}, './file0\x00'}) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x40, @any, 0x0, 0x1}, 0xe) socketpair(0x28, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f00000000c0)={0x0, 0x6, 0x8}) 15:47:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x803c0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:35 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3409.493466] loop5: detected capacity change from 0 to 32768 [ 3409.498996] loop3: detected capacity change from 0 to 1025 [ 3409.500786] EXT4-fs (loop5): unsupported descriptor size 0 [ 3409.507622] loop5: detected capacity change from 0 to 32768 [ 3409.509032] EXT4-fs (loop5): unsupported descriptor size 0 [ 3409.526862] loop1: detected capacity change from 0 to 1024 15:47:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3409.558151] loop0: detected capacity change from 0 to 1024 [ 3409.561521] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3409.564928] EXT4-fs (loop1): get root inode failed [ 3409.565359] EXT4-fs (loop1): mount failed [ 3409.577738] loop5: detected capacity change from 0 to 65536 [ 3409.578243] EXT4-fs (loop0): inodes count not valid: 3360 vs 32 [ 3409.585776] EXT4-fs (loop5): unsupported descriptor size 0 [ 3409.597065] loop0: detected capacity change from 0 to 1024 [ 3409.608506] EXT4-fs (loop0): inodes count not valid: 3360 vs 32 15:47:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:47:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655f", 0x10, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:47:35 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03fffffffe0000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:47:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="201000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:35 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001be, 0x0, 0x0, 0x0) 15:47:35 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03feffffff0000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3409.758840] loop5: detected capacity change from 0 to 98304 [ 3409.777832] EXT4-fs (loop5): unsupported descriptor size 0 [ 3409.786159] loop5: detected capacity change from 0 to 98304 [ 3409.790171] EXT4-fs (loop5): unsupported descriptor size 0 [ 3409.825443] loop1: detected capacity change from 0 to 1024 [ 3409.831203] loop0: detected capacity change from 0 to 1024 [ 3409.841977] EXT4-fs (loop0): inodes count not valid: 4128 vs 32 [ 3409.853561] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3409.854685] loop0: detected capacity change from 0 to 1024 [ 3409.855957] EXT4-fs (loop0): inodes count not valid: 4128 vs 32 [ 3409.858354] EXT4-fs (loop1): get root inode failed [ 3409.858943] EXT4-fs (loop1): mount failed [ 3410.370578] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3410.370578] 15:47:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80410, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="202400000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001bf, 0x0, 0x0, 0x0) 15:47:45 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000010000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:47:45 executing program 4: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x40, @any, 0x7fff, 0x1}, 0xfffffffffffffef4) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040), 0x4) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x400, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0xd13, 0x1}, 0xe) 15:47:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:47:45 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:47:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000", 0x18, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3419.698109] loop1: detected capacity change from 0 to 1024 [ 3419.717638] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3419.719837] EXT4-fs (loop1): get root inode failed [ 3419.720262] EXT4-fs (loop1): mount failed [ 3419.729753] loop5: detected capacity change from 0 to 131072 [ 3419.730978] loop0: detected capacity change from 0 to 1024 15:47:45 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x5, 0x1}, 0xe) [ 3419.733692] EXT4-fs (loop5): unsupported descriptor size 0 [ 3419.748362] loop3: detected capacity change from 0 to 1026 [ 3419.755730] loop5: detected capacity change from 0 to 131072 [ 3419.763678] EXT4-fs (loop5): unsupported descriptor size 0 [ 3419.769016] EXT4-fs (loop0): inodes count not valid: 9248 vs 32 [ 3419.778503] loop0: detected capacity change from 0 to 1024 [ 3419.791189] EXT4-fs (loop0): inodes count not valid: 9248 vs 32 [ 3419.815952] loop1: detected capacity change from 0 to 1024 15:47:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000", 0x18, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:47:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3419.825617] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3419.826846] EXT4-fs (loop1): get root inode failed [ 3419.827252] EXT4-fs (loop1): mount failed 15:47:46 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001c0, 0x0, 0x0, 0x0) [ 3419.878351] loop1: detected capacity change from 0 to 1024 15:47:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000", 0x18, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3419.894761] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3419.899226] EXT4-fs (loop1): get root inode failed [ 3419.899780] EXT4-fs (loop1): mount failed 15:47:46 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000080000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:47:46 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x100, 0x1}, 0xe) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x6) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:47:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="202700000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3419.954857] loop5: detected capacity change from 0 to 163840 [ 3419.972150] EXT4-fs (loop5): unsupported descriptor size 0 [ 3420.003878] loop5: detected capacity change from 0 to 163840 [ 3420.009764] loop0: detected capacity change from 0 to 1024 [ 3420.012190] EXT4-fs (loop0): inodes count not valid: 10016 vs 32 [ 3420.017274] EXT4-fs (loop5): unsupported descriptor size 0 [ 3420.019144] loop0: detected capacity change from 0 to 1024 [ 3420.022840] EXT4-fs (loop0): inodes count not valid: 10016 vs 32 [ 3420.618169] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3420.618169] 15:47:55 executing program 4: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:47:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80500, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001c1, 0x0, 0x0, 0x0) 15:47:55 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000001100000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:47:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:47:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="204300000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:55 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:47:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3429.224078] loop1: detected capacity change from 0 to 1024 [ 3429.226804] loop0: detected capacity change from 0 to 1024 [ 3429.235691] EXT4-fs (loop0): inodes count not valid: 17184 vs 32 [ 3429.243691] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 3429.245576] EXT4-fs (loop1): mount failed [ 3429.257380] loop0: detected capacity change from 0 to 1024 [ 3429.260032] loop5: detected capacity change from 0 to 196608 [ 3429.265321] EXT4-fs (loop0): inodes count not valid: 17184 vs 32 [ 3429.265828] loop3: detected capacity change from 0 to 1026 15:47:55 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) io_setup(0x9, &(0x7f0000000080)=0x0) r3 = syz_open_dev$rtc(&(0x7f00000000c0), 0x40, 0x103000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r4, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000300)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x5, r3, &(0x7f0000000140)="24a2f5c291df523701fe4b38de1558910b46df5f376b0f259b15e7d957e624f4f157b17adc3e06f5df", 0x29, 0x2000000, 0x0, 0x1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x200, r4, &(0x7f00000001c0)="416788a52ba0fafa3e7282f165800f59f8b24d49a1fe7b25ca079505060042ae3386cf49018187ee00c1cd034276d0d9bdc4804dfab2d132ba65e445859b27bd84ef82846b81a2fb5937427a0b312c40e5b4c5ec3bcb68fa392738904587222ef94948c8db4f11baedf8855af1817261eb61c0cbe9f60ff318976b44d3f7632aaa96c159ebe8ab2e1d555d6b01cac20023356e5de306f7fda0edf9344d870b29a9ca2da62486c33487fc88318f7213ba38500618dde0d5b1da1a4062ef946fa58646097afafbba3dcbae08e6331b225b7602012537f97fa1e65ffd9831f13b49c537c247f9273dd6c25318fe6890228bc6de737aa403d25e", 0xf8, 0x3e, 0x0, 0x1}]) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x6, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x3f, 0x1}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3429.276777] EXT4-fs (loop5): unsupported descriptor size 0 [ 3429.288412] loop5: detected capacity change from 0 to 196608 [ 3429.292143] EXT4-fs (loop5): unsupported descriptor size 0 15:47:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="206000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:47:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:47:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001c2, 0x0, 0x0, 0x0) [ 3429.355141] loop0: detected capacity change from 0 to 1024 15:47:55 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000003400000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3429.368422] EXT4-fs (loop0): inodes count not valid: 24608 vs 32 [ 3429.376097] loop1: detected capacity change from 0 to 1024 15:47:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3429.398387] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 3429.400874] EXT4-fs (loop1): mount failed 15:47:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="209601000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3429.460447] loop5: detected capacity change from 0 to 229376 [ 3429.467646] loop0: detected capacity change from 0 to 1024 15:47:55 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x9, @any, 0x5}, 0xe) r2 = socket$unix(0x1, 0x7, 0x0) listen(r2, 0x1) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x87, @none, 0xfffb, 0x2}, 0xe) setsockopt$sock_int(r1, 0x1, 0x5, &(0x7f00000000c0), 0x4) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r3, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r4, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r4, 0x0, 0x1, &(0x7f0000000140)=0x4, 0x4) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x4, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x392c}, 0xe) 15:47:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3429.483780] EXT4-fs (loop5): unsupported descriptor size 0 [ 3429.500417] loop1: detected capacity change from 0 to 1024 [ 3429.505870] loop5: detected capacity change from 0 to 229376 [ 3429.510932] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 3429.512560] EXT4-fs (loop1): mount failed [ 3429.529692] EXT4-fs (loop5): unsupported descriptor size 0 [ 3429.536895] EXT4-fs (loop0): inodes count not valid: 103968 vs 32 [ 3429.548325] loop0: detected capacity change from 0 to 1024 [ 3429.553274] EXT4-fs (loop0): inodes count not valid: 103968 vs 32 [ 3430.136341] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3430.136341] 15:48:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001c3, 0x0, 0x0, 0x0) 15:48:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="209701000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80600, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:48:05 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac", 0x8}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:48:05 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000100000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:48:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000", 0x1e, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:48:05 executing program 4: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)=[{&(0x7f00000000c0)={0xcc, 0x1b, 0x1, 0x70bd28, 0x25dfdbfb, "", [@generic="df3ecd3f86bf92b4463cca01b4ab92a8380302fa47a2990128c110cee11b11823560cda89e36246962da2435d50696ca94a4dc18e394fb59c381596ff7f2589380f69be496d532cbfaba69a0cfe07c654df85e8555a7a95473b70ee8f05e66637d2b1312cb8eab108eaef5f3cfa7eb5d1f87054e1ad50915b5264c6b0620c56bdf6b35a2460a71ad38d29aade2e46f72e82056a73361ec4fa3c463d138b94d816b59235f4438b5cfc97958416cd2bfdb330a68cc904dde0784438c48"]}, 0xcc}, {&(0x7f00000001c0)=ANY=[@ANYBLOB="280000001300140006000000fddbdf2516df5780359069c3b3d0b049df9d055f7f718fc389050001"], 0x28}, {&(0x7f0000001040)={0x16c, 0x26, 0x200, 0x70bd28, 0x25dfdbfc, "", [@nested={0x15c, 0x45, 0x0, 0x1, [@typed={0x6, 0x78, 0x0, 0x0, @str='.\x00'}, @typed={0xc, 0x4f, 0x0, 0x0, @u64=0xeb57}, @generic="6ad98ca0191cc82889d83c5bbc970eab3b81999e144e9fb0a317bb22fbc34e53cc8c30256d0004b0c549aadf589d965145b653c5d62880119a93723b30c6d13b9bcdb674e002e3f4b3caa57f8db8bc9f", @generic="e97c9b6e470c7a0036c8c442cfff14fc9609570e6669757252cff4483a685011022ffe43c47d1c8bb8b6a1aa86c3de5d1e488f7c1e001838851b032840e2905f38088db16d10d5014523562fc451a7432ab8b7239cde86fa43ac2726365a6728d244b0573702a2e947ce05e99169c8f3c6fd58fa1643c8b8ce5813486a4dc7b476a8c8112ffa33f3f9585249d2a136aa833226233bf93f6fcb955cd82290c8f143b1a1d43a889c8f9eead6e9c830c06062f7a83e66b0e687bfc57666fb4d21b34be70d6c2aa1c123cf63d13991a9299d73f4b7bae2d4943d3427b3a4fbab0bd36ac20592a6a8b3ee", @typed={0xc, 0x55, 0x0, 0x0, @u64=0x1}]}]}, 0x16c}], 0x3, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r0}}}], 0x20, 0x20008011}, 0xc841) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)={{0x0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, r0, 0x49}, 0x7, 0x100, 0x0, 0x0, 0x0, 0x0, 0x1}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3439.355325] loop0: detected capacity change from 0 to 1024 [ 3439.364903] EXT4-fs (loop0): inodes count not valid: 104224 vs 32 [ 3439.376106] loop0: detected capacity change from 0 to 1024 [ 3439.382688] EXT4-fs (loop0): inodes count not valid: 104224 vs 32 [ 3439.384283] loop1: detected capacity change from 0 to 1024 [ 3439.385646] loop5: detected capacity change from 0 to 262144 [ 3439.404114] loop3: detected capacity change from 0 to 1027 [ 3439.407095] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 3439.407109] EXT4-fs (loop5): unsupported descriptor size 0 [ 3439.418961] loop5: detected capacity change from 0 to 262144 [ 3439.424817] EXT4-fs (loop5): unsupported descriptor size 0 15:48:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="209801000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:05 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000200000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:48:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001c4, 0x0, 0x0, 0x0) 15:48:05 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000240)=0x80000000) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0xfff9, @none, 0x40, 0x1}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f0000000200)=[{&(0x7f0000000080)="428f0087453734e04cbd4926045811e3ee14b37849603454da436d619b024eec1dcf3b81790b47fa9d9c4c34157596170785ff21eba9c1025398a64e4f078898924845a0eaa31b81924f95ed4f40ea0ebc7be738a137adb8594d4211ab7d7a28ee323b1174cd291b975967571d3301", 0x6f}, {0x0, 0xffffff78}, {&(0x7f0000000140)="5f86f5a3a545b9b9bdfecf2ea9f610617f04770337cd97f544f63d0160c66e912030f877660c08d8db2a33584e812d4fb7d3066346c20f1d27f2c8d3adf29a4e79851c6cc1176a4276f0098959ac86997749a6cbdb57f65fb7cc29ba9ece1b9f1e8cc31521ab3c05792ef87f27cfaff149688b7f67a2c4cba95a5b9601023be4eb37e76cf62da10f7462c9f368923b927f04889fe16314663ce4ee9de010c8ab961f9ba05448c67840dda441cc3500", 0xaf}], 0x3, 0x0, 0x0, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x200, @none, 0x8}, 0xe) 15:48:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3439.490753] loop0: detected capacity change from 0 to 1024 15:48:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3439.502735] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 3439.509357] EXT4-fs (loop0): inodes count not valid: 104480 vs 32 [ 3439.521810] loop0: detected capacity change from 0 to 1024 [ 3439.528907] EXT4-fs (loop0): inodes count not valid: 104480 vs 32 [ 3439.544125] loop1: detected capacity change from 0 to 1024 [ 3439.558519] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 3439.559013] EXT4-fs (loop1): mount failed 15:48:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200003000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3439.589265] loop5: detected capacity change from 0 to 264192 [ 3439.599784] EXT4-fs (loop5): unsupported descriptor size 0 [ 3439.608430] loop5: detected capacity change from 0 to 264192 15:48:05 executing program 4: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042dbd7000fedbdf250200000008000600010000001c000180060001000200000008000600776c63000800080020000000180003801400060000000000000000000000ffffac1e01010c4003800600040001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4084) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:48:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3439.618369] EXT4-fs (loop5): unsupported descriptor size 0 15:48:05 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000400000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3439.633814] loop1: detected capacity change from 0 to 1024 [ 3439.646943] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 3439.647436] EXT4-fs (loop1): mount failed [ 3439.687350] loop0: detected capacity change from 0 to 1024 [ 3439.696876] EXT4-fs (loop0): inodes count not valid: 196640 vs 32 [ 3439.709314] loop0: detected capacity change from 0 to 1024 [ 3439.712024] EXT4-fs (loop0): inodes count not valid: 196640 vs 32 [ 3440.266400] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3440.266400] 15:48:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80700, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:48:15 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000800000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:48:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001c5, 0x0, 0x0, 0x0) 15:48:15 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac", 0x8}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:48:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:48:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) listen(0xffffffffffffffff, 0x1) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:48:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20c003000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3448.882880] loop3: detected capacity change from 0 to 1027 15:48:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001c6, 0x0, 0x0, 0x0) [ 3448.904792] loop0: detected capacity change from 0 to 1024 [ 3448.910353] EXT4-fs (loop0): inodes count not valid: 245792 vs 32 [ 3448.911073] loop5: detected capacity change from 0 to 264192 [ 3448.911590] loop1: detected capacity change from 0 to 1024 [ 3448.920123] loop0: detected capacity change from 0 to 1024 [ 3448.927139] EXT4-fs (loop5): unsupported descriptor size 0 [ 3448.929093] EXT4-fs (loop0): inodes count not valid: 245792 vs 32 [ 3448.929768] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 3448.931390] EXT4-fs (loop1): mount failed [ 3448.946433] loop5: detected capacity change from 0 to 264192 [ 3448.957854] EXT4-fs (loop5): unsupported descriptor size 0 15:48:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="201004000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001c7, 0x0, 0x0, 0x0) 15:48:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:48:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3449.050411] loop0: detected capacity change from 0 to 1024 15:48:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0xe}, 0x4, 0x1}, 0xe) dup(r0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x1001, @none, 0x3, 0x1}, 0xe) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r2, 0x8008f511, &(0x7f00000000c0)) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1040, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',version=9p2000.L,afid=0x0000000000000005,access=client,mask=MAY_WRITE,rootcontext=root,dont_appraise,obj_role=#).&S;)^@[]\\,appraise,dont_measure,subj_type=,euid=', @ANYRESDEC=0xee01, @ANYBLOB="2c736d61636b6673726f6f743daaaaaaaaaa2c666f776e65723c", @ANYRESDEC=r3, @ANYBLOB=',\x00']) 15:48:15 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000b00000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3449.075430] loop1: detected capacity change from 0 to 1024 15:48:15 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac", 0x8}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3449.097467] EXT4-fs (loop0): inodes count not valid: 266272 vs 32 [ 3449.106107] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 3449.120031] loop0: detected capacity change from 0 to 1024 [ 3449.126953] loop5: detected capacity change from 0 to 264192 [ 3449.134530] EXT4-fs (loop0): inodes count not valid: 266272 vs 32 [ 3449.142231] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 3449.148031] EXT4-fs (loop5): unsupported descriptor size 0 [ 3449.177969] loop5: detected capacity change from 0 to 264192 [ 3449.191788] EXT4-fs (loop5): unsupported descriptor size 0 [ 3449.745176] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3449.745176] 15:48:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80900, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:48:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001c8, 0x0, 0x0, 0x0) 15:48:25 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000000e00000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:48:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200005000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:48:25 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x3f, 0x1, 0xc0, 0xff, 0xee, 0x80, 0x8}, 0xc) 15:48:25 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14", 0xc}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3459.296243] loop3: detected capacity change from 0 to 1028 [ 3459.310541] loop0: detected capacity change from 0 to 1024 [ 3459.317083] EXT4-fs (loop0): inodes count not valid: 327712 vs 32 15:48:25 executing program 4: r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="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", 0xff, 0x2}], 0x820404, &(0x7f0000000240)={[{']\'}}\x97'}, {'\xff\xff\xff\xff\xff\xff'}], [{@hash}, {@euid_eq}, {@subj_user={'subj_user', 0x3d, '!'}}, {@obj_user={'obj_user', 0x3d, '\xff\xff\xff\xff\xff\xff'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\xff\xff\xff\xff\xff\xff'}}, {@subj_user={'subj_user', 0x3d, '\\#+\\.}[&/-!0-*I'}}, {@fowner_gt={'fowner>', 0xee01}}]}) openat2(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x220400, 0x4a, 0x2}, 0x18) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) [ 3459.329194] loop1: detected capacity change from 0 to 1024 [ 3459.338925] loop0: detected capacity change from 0 to 1024 [ 3459.340744] loop5: detected capacity change from 0 to 264192 15:48:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001c9, 0x0, 0x0, 0x0) [ 3459.343565] EXT4-fs (loop0): inodes count not valid: 327712 vs 32 [ 3459.352870] EXT4-fs (loop5): unsupported descriptor size 0 [ 3459.366957] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 3459.372333] EXT4-fs (loop1): mount failed [ 3459.373393] loop5: detected capacity change from 0 to 264192 [ 3459.387745] EXT4-fs (loop5): unsupported descriptor size 0 [ 3459.404913] loop4: detected capacity change from 0 to 128 15:48:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001ca, 0x0, 0x0, 0x0) 15:48:25 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000004214702200000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3459.438259] loop4: detected capacity change from 0 to 128 15:48:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200006000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:48:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:48:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001cb, 0x0, 0x0, 0x0) [ 3459.528781] loop0: detected capacity change from 0 to 1024 [ 3459.544573] EXT4-fs (loop0): inodes count not valid: 393248 vs 32 [ 3459.550666] loop5: detected capacity change from 0 to 264192 [ 3459.560819] loop1: detected capacity change from 0 to 1024 [ 3459.561863] EXT4-fs (loop5): unsupported descriptor size 0 [ 3459.563116] loop0: detected capacity change from 0 to 1024 [ 3459.569629] EXT4-fs (loop0): inodes count not valid: 393248 vs 32 [ 3459.573227] loop5: detected capacity change from 0 to 264192 [ 3459.584582] EXT4-fs (loop5): unsupported descriptor size 0 [ 3459.609502] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 3459.609999] EXT4-fs (loop1): mount failed [ 3460.174666] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3460.174666] 15:48:37 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14", 0xc}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:48:37 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000003800000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:48:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80a00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:37 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x6, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:48:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200007000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:48:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10040000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:48:37 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001cc, 0x0, 0x0, 0x0) [ 3470.914023] loop0: detected capacity change from 0 to 1024 15:48:37 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001cd, 0x0, 0x0, 0x0) [ 3470.919083] loop3: detected capacity change from 0 to 1029 [ 3470.926734] loop1: detected capacity change from 0 to 1024 [ 3470.940606] loop5: detected capacity change from 0 to 264192 [ 3470.943657] EXT4-fs (loop0): inodes count not valid: 458784 vs 32 [ 3470.948145] EXT4-fs (loop5): unsupported descriptor size 0 [ 3470.955310] loop5: detected capacity change from 0 to 264192 [ 3470.956872] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 3470.963593] EXT4-fs (loop1): mount failed [ 3470.966418] EXT4-fs (loop5): unsupported descriptor size 0 [ 3470.967677] loop0: detected capacity change from 0 to 1024 [ 3470.981354] EXT4-fs (loop0): inodes count not valid: 458784 vs 32 15:48:37 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000140)='.pending_reads\x00', 0x2100, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000180)={0x6, 'team0\x00', {0x2}}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/hid_sony', 0x105001, 0x0) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x8, @any, 0x5, 0x1}, 0xe) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x6083, 0x0) recvmsg(r3, &(0x7f0000001ac0)={&(0x7f0000000280)=@nl=@unspec, 0x80, &(0x7f0000001900)=[{&(0x7f0000000300)=""/101, 0x65}, {&(0x7f0000000380)=""/40, 0x28}, {&(0x7f00000003c0)=""/156, 0x9c}, {&(0x7f0000000480)=""/67, 0x43}, {&(0x7f0000000500)=""/103, 0x67}, {&(0x7f0000000580)=""/180, 0xb4}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/185, 0xb9}, {&(0x7f0000001700)=""/199, 0xc7}, {&(0x7f0000001800)=""/242, 0xf2}], 0xa, &(0x7f00000019c0)=""/221, 0xdd}, 0x2040) bind$bt_l2cap(r0, &(0x7f0000000200)={0x1f, 0x362, @none, 0x30, 0x1}, 0xe) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f00000001c0)) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000100)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 15:48:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:48:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f000000000000040020", 0x1d}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:48:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200009000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:37 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000004600000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:48:37 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001ce, 0x0, 0x0, 0x0) 15:48:37 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14", 0xc}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 3471.124240] loop5: detected capacity change from 0 to 264192 [ 3471.128398] loop1: detected capacity change from 0 to 1024 [ 3471.143296] EXT4-fs (loop5): unsupported descriptor size 0 [ 3471.143354] loop0: detected capacity change from 0 to 1024 [ 3471.160807] EXT4-fs (loop0): inodes count not valid: 589856 vs 32 [ 3471.163436] loop5: detected capacity change from 0 to 264192 [ 3471.169551] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3471.174306] loop0: detected capacity change from 0 to 1024 [ 3471.178249] EXT4-fs (loop5): unsupported descriptor size 0 [ 3471.180655] EXT4-fs (loop0): inodes count not valid: 589856 vs 32 [ 3471.182144] EXT4-fs (loop1): get root inode failed [ 3471.183190] EXT4-fs (loop1): mount failed 15:48:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000a000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3471.298712] loop5: detected capacity change from 0 to 264192 [ 3471.307649] EXT4-fs (loop5): unsupported descriptor size 0 [ 3471.326523] loop5: detected capacity change from 0 to 264192 [ 3471.338677] EXT4-fs (loop5): unsupported descriptor size 0 [ 3471.356032] loop0: detected capacity change from 0 to 1024 [ 3471.360822] EXT4-fs (loop0): inodes count not valid: 655392 vs 32 [ 3471.366974] loop0: detected capacity change from 0 to 1024 [ 3471.370428] EXT4-fs (loop0): inodes count not valid: 655392 vs 32 [ 3471.788825] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3471.788825] 15:48:47 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169", 0xe}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:48:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80b00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001cf, 0x0, 0x0, 0x0) 15:48:47 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000000000000006000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:48:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:48:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000140)={0x401, 0x20, '\x00', 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0]}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x2) r3 = syz_open_dev$vcsu(&(0x7f0000000300), 0xfffffffffffffffe, 0x88000) connect$bt_l2cap(r3, &(0x7f0000000340)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x8, 0x3}, 0xe) 15:48:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000b000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f000000000000040020", 0x1d}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:48:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001d0, 0x0, 0x0, 0x0) [ 3481.127397] loop0: detected capacity change from 0 to 1024 [ 3481.136974] EXT4-fs (loop0): inodes count not valid: 720928 vs 32 [ 3481.149866] loop3: detected capacity change from 0 to 1029 [ 3481.151219] loop0: detected capacity change from 0 to 1024 [ 3481.152853] loop1: detected capacity change from 0 to 1024 [ 3481.157898] loop5: detected capacity change from 0 to 264192 [ 3481.158306] EXT4-fs (loop0): inodes count not valid: 720928 vs 32 [ 3481.175585] EXT4-fs (loop5): unsupported descriptor size 0 [ 3481.190251] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated 15:48:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001d1, 0x0, 0x0, 0x0) [ 3481.196809] loop5: detected capacity change from 0 to 264192 [ 3481.203386] EXT4-fs (loop1): get root inode failed [ 3481.204240] EXT4-fs (loop1): mount failed [ 3481.220012] EXT4-fs (loop5): unsupported descriptor size 0 15:48:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000d000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:47 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e030000000038005b7600000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3481.298536] loop0: detected capacity change from 0 to 1024 [ 3481.324470] EXT4-fs (loop0): inodes count not valid: 852000 vs 32 [ 3481.327726] loop0: detected capacity change from 0 to 1024 [ 3481.329361] EXT4-fs (loop0): inodes count not valid: 852000 vs 32 [ 3482.054072] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3482.054072] 15:48:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:59 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e0300000000000003e800000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:48:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001d2, 0x0, 0x0, 0x0) 15:48:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200410000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:48:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x27000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:48:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f000000000000040020", 0x1d}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:48:59 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169", 0xe}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:48:59 executing program 4: newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') setresuid(0x0, r0, 0x0) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000040)={{0x2, 0xffffffffffffffff, 0x0, r0, 0xee01, 0x1ca, 0xebac}, 0xd64, 0x3, 0x100, 0xb, 0x0, 0xffffffffffffffff, 0x81}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x2, @any, 0x5}, 0xe) bind$bt_l2cap(r2, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) listen(r2, 0x5) [ 3493.069290] loop0: detected capacity change from 0 to 1024 [ 3493.076930] EXT4-fs (loop0): inodes count not valid: 1049632 vs 32 [ 3493.088206] loop0: detected capacity change from 0 to 1024 [ 3493.093815] EXT4-fs (loop0): inodes count not valid: 1049632 vs 32 [ 3493.096096] loop3: detected capacity change from 0 to 1030 [ 3493.105338] loop1: detected capacity change from 0 to 1024 [ 3493.107102] loop5: detected capacity change from 0 to 264192 [ 3493.121580] EXT4-fs (loop5): unsupported descriptor size 0 [ 3493.134756] EXT4-fs error (device loop1): __ext4_fill_super:5512: inode #2: comm syz-executor.1: iget: special inode unallocated [ 3493.139408] loop5: detected capacity change from 0 to 264192 [ 3493.144107] EXT4-fs (loop1): get root inode failed [ 3493.145195] EXT4-fs (loop1): mount failed 15:48:59 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e0300000000000001f400000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:48:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="202010000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3493.153221] EXT4-fs (loop5): unsupported descriptor size 0 15:48:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001d3, 0x0, 0x0, 0x0) [ 3493.206966] loop0: detected capacity change from 0 to 1024 [ 3493.216690] EXT4-fs (loop0): inodes count not valid: 1056800 vs 32 [ 3493.225280] loop0: detected capacity change from 0 to 1024 [ 3493.232702] EXT4-fs (loop0): inodes count not valid: 1056800 vs 32 15:48:59 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169", 0xe}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:48:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3dd34389, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:48:59 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r0) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x44, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xfffe}, @IEEE802154_ATTR_BAT_EXT={0x5, 0x1a, 0x3}, @IEEE802154_ATTR_SF_ORD={0x5, 0x18, 0x7}, @IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0xe}, @IEEE802154_ATTR_BAT_EXT={0x5, 0x1a, 0x3}, @IEEE802154_ATTR_BCN_ORD={0x5, 0x17, 0xff}]}, 0x44}}, 0x20000805) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f512, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) 15:48:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:48:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200020000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) [ 3493.319943] ------------[ cut here ]------------ [ 3493.320830] WARNING: ./include/linux/ns_common.h:288 at nsproxy_ns_active_get+0x33f/0x3d0, CPU#0: syz-executor.4/92894 [ 3493.322438] Modules linked in: [ 3493.322958] CPU: 0 UID: 0 PID: 92894 Comm: syz-executor.4 Not tainted 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3493.324512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3493.325754] RIP: 0010:nsproxy_ns_active_get+0x33f/0x3d0 [ 3493.326574] Code: ab ff 90 0f 0b 90 eb ee e8 fe d2 ab ff 90 0f 0b 90 e9 3f fd ff ff e8 f0 d2 ab ff 90 0f 0b 90 e9 92 fd ff ff e8 e2 d2 ab ff 90 <0f> 0b 90 e9 e5 fd ff ff e8 d4 d2 ab ff 90 0f 0b 90 e9 38 fe ff ff [ 3493.329217] RSP: 0018:ffff8880541ffe08 EFLAGS: 00010216 [ 3493.330035] RAX: 0000000000000d8c RBX: ffff88804f6a4bc8 RCX: ffffc90005ab7000 [ 3493.331090] RDX: 0000000000040000 RSI: ffffffff81c8ca0e RDI: 0000000000000001 [ 3493.332158] RBP: ffff88800a404001 R08: 0000000000000001 R09: ffffed1001480941 [ 3493.333211] R10: 0000000000000001 R11: 0000000000000001 R12: ffff8880169cbc00 [ 3493.334275] R13: 0000000000000000 R14: ffff8880510ad340 R15: ffff8880541ffe98 [ 3493.335324] FS: 00007ffac9d33700(0000) GS:ffff8880e53a5000(0000) knlGS:0000000000000000 [ 3493.336510] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3493.337349] CR2: 0000000020000001 CR3: 000000005095a000 CR4: 0000000000350ef0 [ 3493.338406] Call Trace: [ 3493.338818] [ 3493.339162] switch_task_namespaces+0x3d/0x110 [ 3493.339876] __do_sys_setns+0x6b0/0x19a0 [ 3493.340499] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3493.340687] loop1: detected capacity change from 0 to 1024 [ 3493.341944] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3493.344656] ? __pfx___do_sys_setns+0x10/0x10 [ 3493.345688] do_syscall_64+0xbf/0x430 [ 3493.346548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3493.347668] RIP: 0033:0x7ffacc7bf107 [ 3493.348446] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 34 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3493.354766] RSP: 002b:00007ffac9d33128 EFLAGS: 00000246 ORIG_RAX: 0000000000000134 [ 3493.356034] RAX: ffffffffffffffda RBX: 00007ffacc8d0f60 RCX: 00007ffacc7bf107 [ 3493.357215] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000000ef [ 3493.358421] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 3493.359607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3493.360786] R13: 00007ffefe4f04cf R14: 00007ffac9d33300 R15: 0000000000022000 [ 3493.362038] [ 3493.362429] irq event stamp: 537 [ 3493.363014] hardirqs last enabled at (547): [] __up_console_sem+0x78/0x80 [ 3493.364414] hardirqs last disabled at (556): [] __up_console_sem+0x5d/0x80 [ 3493.365820] softirqs last enabled at (188): [] handle_softirqs+0x50c/0x770 [ 3493.367235] softirqs last disabled at (161): [] __irq_exit_rcu+0xc4/0x100 [ 3493.368616] ---[ end trace 0000000000000000 ]--- [ 3493.369620] ------------[ cut here ]------------ [ 3493.370376] WARNING: ./include/linux/ns_common.h:288 at nsproxy_ns_active_get+0x35b/0x3d0, CPU#0: syz-executor.4/92894 [ 3493.372124] Modules linked in: [ 3493.372717] CPU: 0 UID: 0 PID: 92894 Comm: syz-executor.4 Tainted: G W 6.18.0-rc4-next-20251105 #1 PREEMPT(voluntary) [ 3493.374703] Tainted: [W]=WARN [ 3493.375211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3493.376553] RIP: 0010:nsproxy_ns_active_get+0x35b/0x3d0 [ 3493.377418] Code: 0f 0b 90 e9 92 fd ff ff e8 e2 d2 ab ff 90 0f 0b 90 e9 e5 fd ff ff e8 d4 d2 ab ff 90 0f 0b 90 e9 38 fe ff ff e8 c6 d2 ab ff 90 <0f> 0b 90 e9 8b fe ff ff e8 b8 d2 ab ff 90 0f 0b 90 e9 de fe ff ff [ 3493.380334] RSP: 0018:ffff8880541ffe08 EFLAGS: 00010216 [ 3493.381225] RAX: 000000000001fd13 RBX: ffff88804f6a4bc8 RCX: ffffc90005ab7000 [ 3493.382411] RDX: 0000000000040000 RSI: ffffffff81c8ca2a RDI: 0000000000000001 [ 3493.383591] RBP: ffff888009868e01 R08: 0000000000000001 R09: ffffed100130d1d7 [ 3493.384757] R10: 0000000000000001 R11: 0000000000000001 R12: ffff8880169cbc00 [ 3493.385930] R13: 0000000000000000 R14: ffff8880510ad340 R15: ffff8880541ffe98 [ 3493.387081] FS: 00007ffac9d33700(0000) GS:ffff8880e53a5000(0000) knlGS:0000000000000000 [ 3493.388386] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3493.389343] CR2: 0000000020000001 CR3: 000000005095a000 CR4: 0000000000350ef0 [ 3493.390547] Call Trace: [ 3493.390982] [ 3493.391365] switch_task_namespaces+0x3d/0x110 [ 3493.392163] __do_sys_setns+0x6b0/0x19a0 [ 3493.392937] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3493.394263] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3493.395269] ? __pfx___do_sys_setns+0x10/0x10 [ 3493.396056] do_syscall_64+0xbf/0x430 [ 3493.396735] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3493.397624] RIP: 0033:0x7ffacc7bf107 [ 3493.398234] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 34 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3493.401579] RSP: 002b:00007ffac9d33128 EFLAGS: 00000246 ORIG_RAX: 0000000000000134 [ 3493.403134] RAX: ffffffffffffffda RBX: 00007ffacc8d0f60 RCX: 00007ffacc7bf107 [ 3493.404319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000000ef [ 3493.405499] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 3493.406676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3493.407847] R13: 00007ffefe4f04cf R14: 00007ffac9d33300 R15: 0000000000022000 [ 3493.409033] [ 3493.409422] irq event stamp: 1053 [ 3493.410031] hardirqs last enabled at (1063): [] __up_console_sem+0x78/0x80 [ 3493.411439] hardirqs last disabled at (1072): [] __up_console_sem+0x5d/0x80 [ 3493.412874] softirqs last enabled at (992): [] handle_softirqs+0x50c/0x770 [ 3493.414264] softirqs last disabled at (951): [] __irq_exit_rcu+0xc4/0x100 [ 3493.415642] ---[ end trace 0000000000000000 ]--- [ 3493.419789] loop0: detected capacity change from 0 to 1024 [ 3493.426561] EXT4-fs (loop0): inodes count not valid: 2097184 vs 32 [ 3493.434899] loop5: detected capacity change from 0 to 264192 [ 3493.445408] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 3493.457558] loop0: detected capacity change from 0 to 1024 [ 3493.462005] EXT4-fs (loop5): unsupported descriptor size 0 [ 3493.469765] EXT4-fs (loop0): inodes count not valid: 2097184 vs 32 [ 3493.471964] loop5: detected capacity change from 0 to 264192 [ 3493.487603] EXT4-fs (loop5): unsupported descriptor size 0 [ 3493.496206] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 3493.973032] EXT4-fs warning (device loop3): ext4_multi_mount_protect:332: MMP startup interrupted, failing mount [ 3493.973032] 15:49:09 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='~', 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x0) dup(r1) 15:49:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x81004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:49:09 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x4, 0x1, 0x0, 0x20000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x6, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc048, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @remote, 0x3f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9", 0xf}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 15:49:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001d4, 0x0, 0x0, 0x0) 15:49:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) 15:49:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="201020000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:49:09 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e0300000000fffffffe00000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 15:49:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3503.016189] loop5: detected capacity change from 0 to 264192 [ 3503.032162] loop1: detected capacity change from 0 to 1024 [ 3503.041600] EXT4-fs (loop5): unsupported descriptor size 0 [ 3503.048435] loop0: detected capacity change from 0 to 1024 [ 3503.058882] EXT4-fs (loop0): inodes count not valid: 2101280 vs 32 [ 3503.062103] loop5: detected capacity change from 0 to 264192 [ 3503.066008] loop3: detected capacity change from 0 to 1032 [ 3503.070551] EXT4-fs (loop5): unsupported descriptor size 0 [ 3503.076329] loop0: detected capacity change from 0 to 1024 15:49:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001d5, 0x0, 0x0, 0x0) [ 3503.090808] EXT4-fs (loop0): inodes count not valid: 2101280 vs 32 15:49:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) [ 3503.120891] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 3503.123937] loop5: detected capacity change from 0 to 264192 15:49:09 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e0300000000ffffffff00000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3503.126003] EXT4-fs (loop5): unsupported descriptor size 0 [ 3503.130675] loop5: detected capacity change from 0 to 264192 [ 3503.132977] EXT4-fs (loop5): unsupported descriptor size 0 15:49:09 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x40, @none, 0x0, 0x1}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)={0x73f, 0x16, 0x7fff, 0x6, 0xe5, 0x1f, 0x5}, 0xc) 15:49:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x0, &(0x7f0000012a00)) 15:49:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200024000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000012a00)) 15:49:09 executing program 6: r0 = socket$inet(0x2, 0x80003, 0xff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180)="9e03000200000000000000000000000000000000c474dc0fb976967de7e57cd23a748a882ffb4669795080a31b2f8efeea38439d46587a3b", 0x38, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) [ 3503.283755] loop5: detected capacity change from 0 to 264192 [ 3503.288679] EXT4-fs (loop5): unsupported descriptor size 0 15:49:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {0x0, 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) [ 3503.303825] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 15:49:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="7e1154a472e386badb736fc6279750f124f69ffe4b1a464b5565663e9f0990a7f10d2ebaf8279576e1e3d80f09505cde7c66a1989b48cf86f442d59687f91f79fe5eff9a", 0x44}, {0x0}], 0x10000000000001d6, 0x0, 0x0, 0x0) VM DIAGNOSIS: 15:48:59 Registers: info registers vcpu 0 RAX=0000000000000034 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8291d3f5 RDI=ffffffff8895d800 RBP=ffffffff8895d7c0 RSP=ffff8880541ff5c8 R8 =0000000000000000 R9 =ffffed100157f046 R10=0000000000000034 R11=0000000000000001 R12=0000000000000034 R13=0000000000000010 R14=ffffffff8895d7c0 R15=ffffffff8291d3e0 RIP=ffffffff8291d44d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007ffac9d33700 00000000 00000000 GS =0000 ffff8880e53a5000 00000000 00000000 LDT=0000 fffffe0600000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020000001 CR3=000000005095a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007ffacc8a47c000007ffacc8a47c8 XMM02=00007ffacc8a47e000007ffacc8a47c0 XMM03=00007ffacc8a47c800007ffacc8a47c0 XMM04=ffffffff0000ff00000000ff00000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000000 RBX=0000000000000000 RCX=ffffffff812c88cb RDX=1ffff11002bfea68 RSI=0000000000000000 RDI=0000000000000000 RBP=ffff888015ff6a40 RSP=ffff888015f77f10 R8 =0000000000000000 R9 =ffffed1002bfea68 R10=ffff888015ff5347 R11=0000000000000000 R12=0000000000000000 R13=0000000000000003 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff817497c0 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f74a12768c0 00000000 00000000 GS =0000 ffff8880e54a5000 00000000 00000000 LDT=0000 ffff888000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007efe54090da0 CR3=0000000009e99000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffff0000000000 XMM02=0000561857ac20100000561858370c50 XMM03=0000000000000000000000317570632f XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=000056185831fc40000056185831fc20 XMM06=0000561858366d700000000000000000 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000